{"id":2256,"date":"2018-09-24T06:42:55","date_gmt":"2018-09-24T04:42:55","guid":{"rendered":"https:\/\/staging.blogs.yokogawa.de\/chemical-pharma\/uncategorized\/meltdown-and-spectre-vulnerabilities-in-processors\/"},"modified":"2022-06-17T09:28:27","modified_gmt":"2022-06-17T07:28:27","slug":"meltdown-and-spectre-vulnerabilities-in-processors","status":"publish","type":"post","link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/","title":{"rendered":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!"},"content":{"rendered":"<p>\u201cMeltdown\u201d and \u201cSpectre\u201d are the names given by security experts to two vulnerabilities in processors or <a href=\"https:\/\/de.wikipedia.org\/wiki\/Prozessor\"><em>central processing units<\/em><\/a> (CPUs). They were discovered by a team comprised of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Project_Zero\">Google Project Zero<\/a> employees, university researchers and industry experts. Many modern processors including <a href=\"https:\/\/www.intel.de\/content\/www\/de\/de\/homepage.html\">Intel<\/a>, <a href=\"http:\/\/www.amd.com\/en\/home\">AMD<\/a> and <a href=\"https:\/\/www.arm.com\/\">ARM<\/a> are affected. Security specialists and manufacturers alike describe them as a very serious problem, and all stakeholders are doing their utmost to provide updates fast.<\/p>\n<h3><strong>Design flaws in processors<\/strong><\/h3>\n<p>The security architecture of computer chips \u2013 the hardware design \u2013 is not safe. In other words, normal programs running in the application memory can gain access to the layout and contents of the protected <a href=\"https:\/\/de.wikipedia.org\/wiki\/Kernel_(Betriebssystem)\">kernel<\/a>. To prevent this from happening, the kernel memory and the application memory would have to be strictly isolated from one another (hardened).<\/p>\n<h3><strong>What can happen?<\/strong><\/h3>\n<p><a href=\"https:\/\/meltdownattack.com\/\">\u201cMeltdown\u201d and \u201cSpectre\u201d<\/a> allow cybercriminals to read sensitive data like passwords or \u201ccrypto-keys\u201d. They are then in a position to manipulate, or in the worst case delete, other data. <em>They take advantage of a feature of modern out-of-order processors, which do exactly what their name says: work out of order. To fulfill this mission, they must speculatively execute a few instructions which may not actually be executed in the real program flow if the speculation is wrong. These instructions often load data that is assumed to be required into the caches, update the translation lookaside buffers (TLB) needed to calculate the address and make more speculative preparations \u2013 all of which delivers huge performance benefits and without which out-of-order would be pointless. Yet these speculative instructions are also where the crux lies, because they create space for a whole series of attack scenarios (source: <\/em><a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/Analyse-zur-Prozessorluecke-Meltdown-und-Spectre-sind-ein-Security-Supergau-3935124.html\"><em>heise.de<\/em><\/a><em>).<\/em><\/p>\n<h3><strong>The three known vulnerability variants<\/strong><\/h3>\n<h3><strong>\u201cMeltdown\u201d<\/strong><\/h3>\n<p><strong>Variant 1: \u201cRogue Data Cache Load\u201d<\/strong> \u2013 (CVE-2017-5754)<\/p>\n<p>This requires increased isolation of kernel memory, referred to as kernel page-table isolation (KPTI).<br \/>\nBy running certain program code, cybercriminals can access the memories of various kernel users which they do not have permission to access.<\/p>\n<h3><strong>\u201cSpectre\u201d<\/strong><\/h3>\n<p><strong>Variant 2: \u201cBounds Check Bypass\u201d<\/strong> (CVE-2017-5753)<br \/>\nThis vulnerability affects specific instruction sequences within compiled applications. Additional exploitation is possible, for example, through JavaScript weaknesses or browser attacks.<\/p>\n<p><strong>Variant 3: \u201cBranch Target Injection\u201d<\/strong> (CVE-2017-5715)<br \/>\nThis is currently the basis for concern about \u201cCloud Virtualization\u201d and \u201cHypervisor Bypass\u201d, which can affect entire cloud systems. These vulnerabilities can be fixed either by a CPU microcode update from the CPU vendor or by applying a special software protection like \u201cRetpoline\u201d.<\/p>\n<h3><strong>Have cybercriminals already exploited these vulnerabilities?<\/strong><\/h3>\n<p>No actual cyber attacks are known to have been carried out to date.<\/p>\n<h3><strong>What steps is Yokogawa taking? <\/strong><\/h3>\n<p>Functional safety and security are top priorities for Yokogawa! Our cyber security experts are therefore carrying out detailed evaluations and tests to determine the risk level of these known vulnerabilities \u2013 \u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 in our integrated manufacturing execution systems and security systems. Parallel to this, the patches currently available from Microsoft \u2013 for all CPUs since 1995 \u2013 are proactively being put to the acid test to check their compatibility both with Yokogawa\u2019s own systems and with all of the most popular software and antivirus programs. These are essential to mitigate or rule out the risk of \u201cnonconformity\u201d in customer systems.<\/p>\n<h3><strong>Security patches in the pipeline!<\/strong><\/h3>\n<p>The patches verified by our cyber security experts will be made available in mid-February 2018.<\/p>\n<h3><strong>Do you require support?<\/strong><\/h3>\n<p>Feel free to contact us if you have any specific questions, or require support, regarding vulnerabilities in processors. We\u2019d be happy to advise and accompany you on your path to a safe and secure plant.<\/p>\n<p>If you\u2019d like to learn more about <a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/de\/tag\/security\/\">security<\/a>, click <a href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/de\/tag\/security\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security vulnerabilities in processors or Central Processing Units (CPUs) called Meltdown and Spectre are considered serious by security experts. Read here what you need to know about the incidents and what Yokogawa is doing! <\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\"> <span class=\"screen-reader-text\">\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":117,"featured_media":2257,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","footnotes":""},"categories":[59],"tags":[383,82,212,224,384,139,165,179,110,385,386,113,100,73,215,74,387,388,389],"coauthors":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! - Chemical Pharma Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!\" \/>\n<meta property=\"og:description\" content=\"Security vulnerabilities in processors or Central Processing Units (CPUs) called Meltdown and Spectre are considered serious by security experts. Read here what you need to know about the incidents and what Yokogawa is doing!  \u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\" \/>\n<meta property=\"og:site_name\" content=\"Chemical Pharma Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-24T04:42:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T07:28:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1691\" \/>\n\t<meta property=\"og:image:height\" content=\"1123\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fatma Evren\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\"},\"author\":{\"name\":\"Fatma Evren\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad\"},\"headline\":\"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!\",\"datePublished\":\"2018-09-24T04:42:55+00:00\",\"dateModified\":\"2022-06-17T07:28:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\"},\"wordCount\":603,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"keywords\":[\"AMD\",\"Automation\",\"Cyber Security\",\"Data Analysis\",\"Google Project Zero\",\"Industry 4.0\",\"IT security\",\"Malware\",\"Management\",\"Meltdown\",\"Microsoft\",\"plants\",\"process industry\",\"Safety\",\"Safety system\",\"Security\",\"Spectre\",\"Support\",\"Vulnerabilities\"],\"articleSection\":[\"Safety &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\",\"name\":\"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! - Chemical Pharma Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\"},\"datePublished\":\"2018-09-24T04:42:55+00:00\",\"dateModified\":\"2022-06-17T07:28:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"name\":\"Chemical Pharma Blog\",\"description\":\"Yokogawa&#039;s Chemical &amp; Pharma Blog\",\"publisher\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization\",\"name\":\"Chemical Pharma Blog\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"contentUrl\":\"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png\",\"width\":302,\"height\":89,\"caption\":\"Chemical Pharma Blog\"},\"image\":{\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad\",\"name\":\"Fatma Evren\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/705d9e7d4dc124ce066ce1502b785235\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g\",\"caption\":\"Fatma Evren\"},\"url\":\"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! - Chemical Pharma Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/","og_locale":"en_US","og_type":"article","og_title":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!","og_description":"Security vulnerabilities in processors or Central Processing Units (CPUs) called Meltdown and Spectre are considered serious by security experts. Read here what you need to know about the incidents and what Yokogawa is doing!  \u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! Read More &raquo;","og_url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/","og_site_name":"Chemical Pharma Blog","article_published_time":"2018-09-24T04:42:55+00:00","article_modified_time":"2022-06-17T07:28:27+00:00","og_image":[{"width":1691,"height":1123,"url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M.jpg","type":"image\/jpeg"}],"author":"Fatma Evren","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#article","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/"},"author":{"name":"Fatma Evren","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad"},"headline":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!","datePublished":"2018-09-24T04:42:55+00:00","dateModified":"2022-06-17T07:28:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/"},"wordCount":603,"commentCount":2,"publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"keywords":["AMD","Automation","Cyber Security","Data Analysis","Google Project Zero","Industry 4.0","IT security","Malware","Management","Meltdown","Microsoft","plants","process industry","Safety","Safety system","Security","Spectre","Support","Vulnerabilities"],"articleSection":["Safety &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/","name":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! - Chemical Pharma Blog","isPartOf":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website"},"datePublished":"2018-09-24T04:42:55+00:00","dateModified":"2022-06-17T07:28:27+00:00","breadcrumb":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/meltdown-and-spectre-vulnerabilities-in-processors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/"},{"@type":"ListItem","position":2,"name":"\u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors!"}]},{"@type":"WebSite","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#website","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","name":"Chemical Pharma Blog","description":"Yokogawa&#039;s Chemical &amp; Pharma Blog","publisher":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#organization","name":"Chemical Pharma Blog","url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","contentUrl":"https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/05\/yokogawa-logo-e1651674418793.png","width":302,"height":89,"caption":"Chemical Pharma Blog"},"image":{"@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/bef25632a9874d43e7fe7dbe212050ad","name":"Fatma Evren","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/#\/schema\/person\/image\/705d9e7d4dc124ce066ce1502b785235","url":"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9dfa0b587fc6749dc929dd6ff1c83bf0?s=96&d=mm&r=g","caption":"Fatma Evren"},"url":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M.jpg",1691,1123,false],"thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-150x150.jpg",150,150,true],"medium":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-300x199.jpg",300,199,true],"medium_large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-768x510.jpg",768,510,true],"large":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-1024x680.jpg",1024,680,true],"1536x1536":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-1536x1020.jpg",1536,1020,true],"2048x2048":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M.jpg",1691,1123,false],"post-thumbnail":["https:\/\/www.yokogawa.com\/eu\/blog\/app\/uploads\/sites\/8\/2022\/06\/Fotolia_44274106_M-356x200.jpg",356,200,true]},"uagb_author_info":{"display_name":"Fatma Evren","author_link":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/author\/fatma-evren\/"},"uagb_comment_info":2,"uagb_excerpt":"Security vulnerabilities in processors or Central Processing Units (CPUs) called Meltdown and Spectre are considered serious by security experts. Read here what you need to know about the incidents and what Yokogawa is doing! \u201cMeltdown\u201d and \u201cSpectre\u201d \u2013 Vulnerabilities in processors! Read More &raquo;","_links":{"self":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2256"}],"collection":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/comments?post=2256"}],"version-history":[{"count":1,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2256\/revisions"}],"predecessor-version":[{"id":11107,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/posts\/2256\/revisions\/11107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media\/2257"}],"wp:attachment":[{"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/media?parent=2256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/categories?post=2256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/tags?post=2256"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.yokogawa.com\/eu\/blog\/chemical-pharma\/en\/wp-json\/wp\/v2\/coauthors?post=2256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}