Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.

Check out the Crash Course Computer Science series at youtube.com/crashcourse

We're conducting a survey of our viewers! If you have time, please give us feedback: https://www.surveymonkey.com/r/SciShowSurvey2017

Hosted by: Hank Green
----------
Support SciShow by becoming a patron on Patreon: https://www.patreon.com/scishow
----------
Dooblydoo thanks go to the following Patreon supporters: Kelly Landrum Jones, Sam Lutfi, Kevin Knupp, Nicholas Smith, D.A. Noe, alexander wadsworth, سلطا الخليفي, Piya Shedden, KatieMarie Magnone, Scott Satovsky Jr, Bella Nash, Charles Southerland, Bader AlGhamdi, James Harshaw, Patrick Merrithew, Patrick D. Ashmore, Candy, Tim Curwick, charles george, Saul, Mark Terrio-Cameron, Viraansh Bhanushali, Kevin Bealer, Philippe von Bergen, Chris Peters, Justin Lentz
----------
Looking for SciShow elsewhere on the internet?
Facebook: http://www.facebook.com/scishow
Twitter: http://www.twitter.com/scishow
Tumblr: http://scishow.tumblr.com
Instagram: http://instagram.com/thescishow
----------
Sources:

https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://www.pcworld.com/article/3245606/security/intel-x86-cpu-kernel-bug-faq-how-it-affects-pc-mac.html
http://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading04.htm
https://support.apple.com/en-us/HT208394
https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/
http://mashable.com/2018/01/04/spectre-meltdown-explained/#dnSmYeEpymqy
https://meltdownattack.com/
https://www.wired.com/story/meltdown-and-spectre-vulnerability-fix/
https://www.wired.com/story/critical-intel-flaw-breaks-basic-security-for-most-computers/?mbid=BottomRelatedStories
https://suif.stanford.edu/papers/lam92/subsection3_2_1.html
https://www.usenix.org/legacy/publications/library/proceedings/osdi99/full_papers/chang/chang_html/node4.html