When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Similar attacks were the underlying cause ofSpectre and MeltdowninIntel’s chips years ago.

Both of these new vulnerabilities target features aimed at speeding up processing by guessing at future instructions.

iPhone 16 Pro shown held in hand

The speeding up can leave traces in memory which can be used to extract sensitive information.

This method has been used to retrieveGmailinbox data,Amazonorders and browsing data and Reddit user activity.

More from Tom’s Guide

Find My iPhone

Apple iPhone 16 Plus Review.

iPhone 16 Pro shown held in hand

MacBook Pro 2021 (16-inch) on a patio table

A woman�s hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

A hacker typing quickly on a keyboard

An open lock depicting a data breach

NYTimes Connections

Fire TV interface on the Fire TV Stick 4K (2nd gen)

A person holding a Nintendo Switch 2 playing Mario Kart World

Left to right: Billy Magnussen, Osy Ikhile, Paul G. Raymond, Cristin Milioti, Milanka Brooks in Black Mirror season 7

NYT Strands on a cellphone