![]() ![]() The important thing about ZombieLoad is that it shows how as platforms become more secure, attackers are exploring far more sophisticated ways to exploit devices. Traditional computer security models have relied on perimeter protection – things like firewalls, virus checkers, and malware detection.īut those defenses aren’t robust enough to tackle or spot a threat like ZombieLoad. This flaw lets hackers use design weaknesses in Intel chips (back to 2011) to steal data from machines, including Macs.Īpple very quickly shipped security patches to protect against this vulnerability and published a detailed support document that Mac users who handle particularly sensitive data should read. ![]() The nature of cyber attacks is changing. One good illustration of how the nature of these threats are changing comes in the form of the recently-revealed Intel processor vulnerability, ZombieLoad. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |