Unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. While possible in theory, this is unlikely in practice. ![]() ![]() Can my antivirus detect or block this attack? The exploitation does not leave any traces in traditional log files. Can I detect if someone has exploited Meltdown or Spectre against me? ![]() Questions & Answers Am I affected by the vulnerability?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |