• About Us
  • Contact Us
  • Advertise
  • Privacy Policy
  • Guest Post
No Result
View All Result
Digital Phablet
  • Home
  • NewsLatest
  • Technology
    • Education Tech
    • Home Tech
    • Office Tech
    • Fintech
    • Digital Marketing
  • Social Media
  • Gaming
  • Smartphones
  • AI
  • Reviews
  • Interesting
  • How To
  • Home
  • NewsLatest
  • Technology
    • Education Tech
    • Home Tech
    • Office Tech
    • Fintech
    • Digital Marketing
  • Social Media
  • Gaming
  • Smartphones
  • AI
  • Reviews
  • Interesting
  • How To
No Result
View All Result
Digital Phablet
No Result
View All Result

Home » Apple Ignores Hardware Threats to M-Series Macs

Apple Ignores Hardware Threats to M-Series Macs

Rukhsar Rehman by Rukhsar Rehman
January 30, 2025
in News
Reading Time: 3 mins read
A A
Apple Ignores Hardware Threats to M-Series Macs
ADVERTISEMENT

Select Language:

Recent findings by security researchers have unearthed vulnerabilities in Apple devices equipped with M2 and A15 chips and newer models. This includes a range of gadgets such as iPhones, iPads, MacBook laptops, and Mac desktops. The identified flaws, named SLAP and FLOP, were initially highlighted by Bleeping Computer, and may enable cybercriminals to extract data from a user’s active web tabs. Depending on the open tabs, this could expose private information such as passwords and banking details.

These vulnerabilities stem from a hardware issue rather than being a software-related concern. They impact the CPUs, making them susceptible to side-channel attacks. Such exploits analyze CPU performance, leveraging variables like power use, timing, and auditory cues to glean details about user activity—much like the Spectre and Meltdown weaknesses uncovered back in 2018.

While these revelations are complex, the key takeaway is that they open the door for attackers to access sensitive information even when it’s well-protected by software. This is not solely an Apple issue; rather, it’s linked to a performance enhancement technique that most modern CPUs incorporate.

At its core, computer programming involves a sequence of instructions for the CPU to follow, which branch out into numerous possible outcomes. For instance, scenarios can be set as “if A occurs, execute X; if B happens, proceed with Y.” As programs grow, they handle a myriad of decisions to drive functionality.

To increase operational speed, it has become commonplace to predict which path a CPU should pursue and begin executing instructions preemptively. This method allows multiple tasks to progress simultaneously instead of waiting sequentially.

This optimization technique, known as speculative execution or branch prediction, is based on anticipatory logic, which can sometimes lead to errors. When these predictions fail, the resulting vulnerabilities can be exploited by attackers.

SLAP and FLOP flaws on Apple Silicon.
predictors.fail / predictors.fail

The complete titles for these vulnerabilities are “Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP)” and “Breaking the Apple M3 CPU via False Load Output Predictions (FLOP).” While both flaws essentially produce the same outcome, SLAP is confined to the Safari browser, whereas FLOP is also applicable to Chrome.

The research provides evidence that attacks utilizing these vulnerabilities are feasible, although there is currently no information suggesting that they have been exploited by hackers. The researchers disclosed their findings to Apple last year, which acknowledged receipt and mentioned intentions to resolve the vulnerabilities. However, since the papers’ publication, Apple has only issued a single statement, saying:

“We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these types of threats. Based on our analysis, we do not believe this issue poses an immediate risk to our users.”

While these attacks don’t rely on malware, they typically initiate from visits to malicious websites. Thus, a prudent approach is to exercise caution with suspicious links and URLs until security patches are rolled out.

ChatGPT ChatGPT Perplexity AI Perplexity Gemini AI Logo Gemini AI Grok AI Logo Grok AI
Google Banner
Tags: AppleHardwareM-seriesMacsthreat
ADVERTISEMENT
Rukhsar Rehman

Rukhsar Rehman

A University of California alumna with a background in mass communication, she now resides in Singapore and covers tech with a global perspective.

Related Posts

iPhone 17 Makes Standard Screen Protectors Less Useful
Smartphones

iPhone 17 Makes Standard Screen Protectors Less Useful

December 4, 2025
Apple To Become World’s Top Phone Maker Again
Smartphones

Apple To Become World’s Top Phone Maker Again

November 28, 2025
IPhone 17 Sets Sales Record in Tough Chinese Market
Smartphones

IPhone 17 Sets Sales Record in Tough Chinese Market

November 18, 2025
iPhone 17 Launch Boosted China Sales by 22%
Smartphones

iPhone 17 Launch Boosted China Sales by 22%

November 15, 2025
Next Post

How to Easily Scan Copies, Photos, and Signatures

  • About Us
  • Contact Us
  • Advertise
  • Privacy Policy
  • Guest Post

© 2025 Digital Phablet

No Result
View All Result
  • Home
  • News
  • Technology
    • Education Tech
    • Home Tech
    • Office Tech
    • Fintech
    • Digital Marketing
  • Social Media
  • Gaming
  • Smartphones

© 2025 Digital Phablet