The Week In Review: Design

Security Security researchers identified a major exploit of the "speculative execution" technique used to optimize performance in modern processors. The flaws allow an attacker to read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications, according to Google's Jann Horn. Multiple researchers discovered the issues indepen... » read more