New cloud attack takes full control of virtual machines with little effort

The world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips individual bits in computer memory. It’s a technique that’s so surgical and controlled that it allows one machine to effectively steal the cryptographic keys of another machine hosted in the same cloud environment.

Tags: 

Read more: New cloud attack takes full control of virtual machines with little effort

Story added 1. September 2016, content source with full text you can find at link above.