Given the seriousness and impact of the vulnerabilities published these days that affect the x64 architecture processors (Intel + AMD) as well as some ARM architecture ones, we have decided to clarify some aspects derived. Do not hesitate to contact us for further details.
1. Brief explanation on the vulnerabilities
Currently we can find two security notices that respond to the key names of MeltDown and Spectre. These vulnerabilities correspond to the physical design of processors and therefore are bound to the hardware layer of computers. The compromised hardware implementations are those that refer to the functionality of the processors to execute instructions out of order and to the speculative execution that have been in the market since 1995 (yes, 1995).
Execution out of order means that the processor can reorder the instructions to execute a code (always preserving the final result!) grouping those non-dependendant. The speculative execution is based on the fact that after finding a condition within the code the processor speculates on the result by executing one of the possibilities in advance. If he succeeds on guessing the result it will use it; otherwise the result is discarded.
2. Measures to keep in mind
Keep the operating system and browsers constantly updated. Both the Linux community, Microsoft and Apple are working intensely and have already begun providing updates to mitigate vulnerabilities.
Have a reliable backup system that contains the important data and keep it in a separate channel from the server / computer. This measure (recommended in any scenario) is only preventative since we do not know how to take advantage of these vulnerabilities.
IMPORTANT: These recommendations are intended to minimize the potential impacts and therefore we must remember that being a hardware vulnerability we can never be 100% safe.