The world of IT has just witnessed the most unsettling attack resulting from the rowhammer exploit. The exploit can flip individual bits in the memory of a computer.
The technique is so precise that it can allow a single machine to start stealing data from other machines that are hosted on the same cloud.
Until now, the Rowhammer exploit was considered a clumsy attack tool because it wasn’t really good enough to control where the data corrupting bits happened on a machine. Up till now, this attack was only considered a glitch until recently.
It is now capable of manipulating deduplication operations that are very common amongst cloud hosts to save memory.
Read more details http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/
The post A new cloud attack can take full control of virtual machines with virtually no effort put in appeared first on Cyber Security Portal.
from Cyber Security Portal https://cybersecurityportal.com/new-cloud-attack-can-take-full-control-virtual-machines-virtually-no-effort-put/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/149800148880
via Zoe Hamilton
No comments:
Post a Comment