How to protect your PC from the major Meltdown and Spectre CPU flaws

A pair of nasty CPU flaws exposed this week have serious ramifications for home computer users. Meltdown and Spectre let attackers access protected information in your PCâs kernel memory, potentially revealing sensitive details like passwords, cryptographic keys, personal photos and email, or anything else youâve used on your computer. Itâs a serious flaw. Fortunately, CPU and operating system vendors pushed out patches fast, and you can protect your PC from Meltdown and Spectre to some degree.
Itâs not a quick one-and-done deal, though. Theyâre two very different CPU flaws that touch every part of your operating system, from hardware to software to the operating system itself. Check out PCWorldâs Meltdown and Spectre FAQ for everything you need to know about the vulnerabilities themselves. Weâve cut through the technical jargon to explain what you need to know in clear, easy-to-read language. Weâve also created an overview of how the Spectre CPU bug affects phones and tablets.
The guide youâre reading now focuses solely on protecting your computer against the Meltdown and Spectre CPU flaws.
Editorâs note: This article was last updated to remove a link to direct downloads of the Windows Meltdown patch, mention how some AMD systems are becoming unbootable after installing it, and add performance impact estimates from Microsoft.Â
How to protect your PC against Meltdown and Spectre CPU flaws
Hereâs a quick step-by-step checklist, followed by the full process.
- Update your operating system
- Check for firmware updates
- Update your browser
- Keep your antivirus active
First, and most important: Update your operating system right now. The more severe flaw, Meltdown, affects âeffectively every [Intel] processor since 1995,â according to the Google security researchers that discovered it. Itâs an issue with the hardware itself, but the major operating system makers have rolled out updates that protect against the Meltdown CPU flaw.

Brad Chacos/IDG
Microsoft pushed out an emergency Windows patch late in the day on January 3. If it didnât automatically update your PC, head to Start > Settings > Update & Security > Windows Update, then click the Check now button under âUpdate status.â (Alternatively, you can just search for âWindows Update,â which also works for Windows 7 and 8.) Your system should detect the available update and begin downloading it. Install the update immediately.
You might not see the update, though. Some antivirus products arenât playing nice with the emergency patch, causing Blue Screens of Death and boot-up errors. Likewise, the Meltdown patch renders some AMD computers unbootable, which forced Microsoft to halt its roll-out of the fix to potentially impacted systems. Because of the barrage of severely system-breaking errors, we do not recommend manually installing the Windows Meltdown patches if Microsoft hasnât pushed them to your PC via Windows Update. We arenât even going to link to the download page for the Meltdown updates. Donât do it.

Google/Natascha Eibl
Apple quietly worked Meltdown protections into macOS High Sierra 10.13.2, which released in December. If your Mac doesnât automatically apply updates, force it by going into the App Storeâs Update tab. Chromebooks should have already updated to Chrome OS 63 in December. It contains mitigations against the CPU flaws. Linux developers are working on kernel patches. Patches are also available for the Linux kernel.
Now for the bad news. The operating system patches will slow down your PC, though the extent varies wildly depending on your CPU and the workloads youâre running. Intel expects the impact to be fairly small for most consumer applications like games or web browsing, and initial testing supports that, and reveals storage speeds can take a significant dip. Microsoft says Windows 10 PCs with Skylake (Core 6xxx series) chips or newer shouldnât see much performance impact; Windows 10 PCs with 2015-era or older Intel processors âshow more significant slowdownsâ; and on Windows 7 and 8 systems with older Intel CPUs, Microsoft âexpects most users to notice a decrease in system performance.â
You still want to install the updates for security reasons.
Check for a firmware update

Gordon Mah Ung
Because Meltdownâs CPU exploits exist on a hardware level, Intel is also releasing firmware updates for its processors. âBy the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years,â it said in a statement on January 4.
Actually getting those firmware updates is tricky, because firmware updates arenât issued directly from Intel. Instead, you need to snag them from the company that made your laptop, PC, or motherboardâthink HP, Dell, Gigabyte, et cetera. Because of that, patches for individual systems will likely take longer than Intelâs stated week to trickle down to home users. Most prebuilt computers and laptops have a sticker with model details somewhere on their exterior. Find that, then search for the support page for your PC or motherboardâs model number.
Update your browser
You also need to protect against Spectre, which tricks software into accessing your protected kernel memory. Intel, AMD, and ARM chips are vulnerable to Spectre to some degree. Software applications need to be updated to protect against Spectre. The major PC web browsers have all issued updates as a first line of defense against nefarious websites seeking to exploit the CPU flaw with Javascript.

Brad Chacos/IDG
Microsoft updated Edge and Internet Explorer alongside Windows 10. Firefox 57 also wraps in some Spectre safeguards. Chrome 63 made âSite Isolationâ an optional experimental feature. You can activate it right now by entering chrome://flags/#enable-site-per-process into your URL bar, then clicking Enable next to âStrict site isolation.â Chrome 64 will have more protections in place when it launches on January 23.
On January 8, Apple pushed out updates to iOS 11 and macOS with âsecurity improvements to Safari and WebKit to mitigate the effects of Spectre.â
Keep your antivirus active
Finally, this ordeal underlines how important it is to keep your PC protected. The Google researchers who discovered the CPU flaws say that traditional antivirus wouldnât be able to detect a Meltdown or Spectre attack. But attackers need to be able to inject and run malicious code on your PC to take advantage of the exploits. Keeping security software installed and vigilant helps keep hackers and malware off your computer. Plus, âyour antivirus may detect malware which uses the attacks by comparing binaries after they become known,â Google says.
PCWorldâs guide to the best antivirus for Windows PCs can help you find the best option for your setup.
This story, “How to protect your PC from the major Meltdown and Spectre CPU flaws” was originally published by PCWorld.