Reply to post: 'However, I'd doubt any kind of proof of concept working across "teh intarwebs" '

Oh, great, now there's a SECOND remote Rowhammer exploit

Anonymous Coward
Anonymous Coward

'However, I'd doubt any kind of proof of concept working across "teh intarwebs" '

You can maybe get hold of a machine inside a "cloud" system, and then mount attacks from there...

There's a common misconception that a successful attack is performed with a single spectacular shove, and then everything is wide open - that happens mostly only in movies.

Deep and successful attacks are performed using a variety of techniques adapted to the target system.

Sure, if you write a ransomware you're going for the low hanging fruit, you're not targeting specific systems, you just unleash it and hope it will find systems it can break.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon