Thursday 1 September 2016

A new cloud attack can take full control of virtual machines with virtually no effort put in

ISS_5188_00768 (300 x 250)

The world of IT has just witnessed the most unsettling attack resulting from the rowhammer exploit. The exploit can flip individual bits in the memory of a computer.

The technique is so precise that it can allow a single machine to start stealing data from other machines that are hosted on the same cloud.

Until now, the Rowhammer exploit was considered a clumsy attack tool because it wasn’t really good enough to control where the data corrupting bits happened on a machine. Up till now, this attack was only considered a glitch until recently.

It is now capable of manipulating deduplication operations that are very common amongst cloud hosts to save memory.

Read more details http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/

The post A new cloud attack can take full control of virtual machines with virtually no effort put in appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/new-cloud-attack-can-take-full-control-virtual-machines-virtually-no-effort-put/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/149800148880
via Zoe Hamilton

No comments:

Post a Comment