Meltdown and Spectre: How to Protect Your PC and Phone Now

Status
Not open for further replies.

tech44

Prominent
Jan 10, 2018
1
0
510
0


You say in the article that "None of these vulnerabilities have been exploited in the wild yet". There is no way to tell if the vulnerabilities have been exploited in the wild. You can bet state sponsored hackers and intelligence agencies knew about these vulnerabilities long ago. Google researchers in their own white papers insist that they have no idea if these exploits have been used. The exploitation does not leave any traces in traditional log files. When asked if the exploit has been used in the wild, they correctly posit, they don't know.
 
Status
Not open for further replies.
Thread starter Similar threads Forum Replies Date
F Antivirus / Security / Privacy 4
D Antivirus / Security / Privacy 2
E Antivirus / Security / Privacy 2
T Antivirus / Security / Privacy 6
C Antivirus / Security / Privacy 5
D Antivirus / Security / Privacy 3
S Antivirus / Security / Privacy 1
A Antivirus / Security / Privacy 5
L Antivirus / Security / Privacy 4
G Antivirus / Security / Privacy 0
A Antivirus / Security / Privacy 1
M Antivirus / Security / Privacy 4
AndrewFreedman Antivirus / Security / Privacy 1
Marshall Honorof Antivirus / Security / Privacy 0
C Antivirus / Security / Privacy 1
R Antivirus / Security / Privacy 7
D Antivirus / Security / Privacy 3
A Antivirus / Security / Privacy 20
Johnny5 Antivirus / Security / Privacy 1
Avast-Team Antivirus / Security / Privacy 1

Similar threads


ASK THE COMMUNITY