Remove meltdown-and-spectre-what-to-do
article thumbnail

Meltdown and Spectre: What they are, and what to do

The Parallax

The flaws’ exploits, dubbed Meltdown and Spectre , are similar but have important differences. The flaws’ exploits, dubbed Meltdown and Spectre , are similar but have important differences. Meltdown breaks down the barriers between software and the operating system; Spectre breaks down barriers between software programs.

Hardware 214
article thumbnail

Server Security: What to Look for in 2019

Dell EMC

How do we rethink our approach in the wake of Spectre & Meltdown? What are the dangers on the horizon, and what sort of innovation can businesses use to combat them? What do you think customers will be dealing with this year? What do you think customers will be dealing with this year?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Examining the Treat Landscape

Tenable

In observation of the Halloween season, let us explore attackers’ tricks and treats and what organizations can do to defend targets. In observation of the Halloween season, let us explore attackers’ tricks and treats and what organizations can do to defend targets. Background. Assorted bag: Initial access.

SMB 98
article thumbnail

How to Make the Most of Your Nessus Trial

Tenable

There's plenty you can do during Nessus Professional's free trial period to experience the strength of the No. It's not always easy to know what to make of free trials, and software in particular can sometimes be so limited in trial mode that it is hard to get a sense of what the full version can do. .

article thumbnail

Microarchitectural Data Sampling: Speculative Execution Side-Channel Vulnerabilities Found in Intel CPUs

Tenable

They follow in the footsteps of the Spectre and Meltdown vulnerabilities reported in 2018. CVE-2018-12126, or the “Fallout” attack, was named by the researchers because “Fallouts are typically a direct consequence of Meltdowns,” indicating it is a follow-up to the Meltdown vulnerability. Background. Named Vulnerability.

Data 42
article thumbnail

How Do Your Cyber Exposure Practices Stack Up to Those of Your Peers?

Tenable

In part five of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question: “How do we compare to our peers?” Here’s what you need to know. How do we compare to our peers? For example, let’s say news breaks of a major headline vulnerability like Meltdown and Spectre.

article thumbnail

Objects in Mirror Are Closer Than They Appear: Reflecting on the Cybersecurity Threats from 2019

Tenable

Tenable’s Security Response Team reviews the biggest cybersecurity threats of 2019. With 2019 coming to an end, the Tenable Security Response Team reflects on the vulnerabilities and threats that had a major impact over the last year. The flaw gained so much attention that both Microsoft and the U.S. Seeing double with DejaBlue.