New cloud attack takes full control of virtual machines with little effort
The world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips individual bits in computer memory. It’s a technique that’s so surgical and controlled that it allows one machine to effectively steal the cryptographic keys of another machine hosted in the same cloud environment.
Tags:
Read more: New cloud attack takes full control of virtual machines with little effort
Story added 1. September 2016, content source with full text you can find at link above.