JUser: :_load: Unable to load user with ID: 987
JUser: :_load: Unable to load user with ID: 989
The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible. Click here to view a webcast from Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, showcasing solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.
Ransomware is a term that first appeared in the news in 2013, and has been showing up more and more frequently ever since. Think back to May 2017, when the entire United Kingdom health services network was briefly hijacked...yes, that was ransomware. If this term hasn’t blipped on your radar yet, it really should. That’s because cyber security experts all agree that ransomware attacks will be one of the most prevalent forms of online theft from 2018 onward. But before we get too apocalyptic, let’s take a step back to understand what ransomware is and where it comes from…