News at the Quantum Level

Microsoft Patch Tuesday – March 2018

Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 74 new… VISIT THE SOURCE ARTICLE Microsoft Patch Tuesday – March 2018 Source

Vulnerability Spotlight: Simple DirectMedia Layer’s SDL2_Image

Overview Talos is disclosing several vulnerabilities identified in Simple DirectMedia Layer’s SDL2_Image library that could allow code execution. Simple DirectMedia Layer is a cross-platform development library designed to provide low… VISIT THE SOURCE ARTICLE Vulnerability Spotlight: Simple DirectMedia Layer’s SDL2_Image Source

PSA: Protect Your PC From The Spectre And Meltdown CPU Vulnerabilities

These CPU vulnerabilities are a BIG deal and should be dealt with. There is a lot of of hoopla surrounding Spectre and Meltdown, the names given to vulnerabilities that affect practically every processor produced in the past two decades. Without taking a deep dive into…

Protecting your Public Cloud after Meltdown and Spectre

In early January, researchers unveiled several major security vulnerabilities. Dubbed Meltdown and Spectre, these two vulnerabilities pertained to a hardware flaw in CPUs, including Intel, Qualcomm, and ARM processors…. VISIT THE SOURCE ARTICLE Protecting your Public Cloud after Meltdown and Spectre Source

However improbable: The story of a processor bug | NETWORKFIGHTS.COM

Spread the love Processor problems have been in the news lately, due to the Meltdown and Spectre vulnerabilities. But generally, engineers writing software assume that computer hardware operates in a reliable, well-understood fashion, and that any problems lie on the software side of the software-hardware…

Security notice: Meltdown and Spectre | NEURALSCULPT

Spread the love Security updates are now available for Meltdown and Spectre. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data…

Copyright © 2018 #HACKMYSTACK