Tuesday, September 25, 2018

New tech news .26 09 2018.A new type of security defect to computers

F Secure Today a security firm has found a new software security flaw that affects modern computers and the Mac. This defective security is said to threaten modern computers.



Advisers from the F Secure Company found these security flaws in modern computers, allowing hackers to work and steal other important data. Computer vendors and users have been alerted to avoiding the information being stolen if they do not take into account such shortcomings.


According to Oli Securate, security officer of the E-Secure security firm, "Hackers will attack the computer based on the vulnerability of the computer, once they have five minutes to get them attached to the computer. More companies are not prepared to control this security weakness. Recently, it has been found that this type of attack has been carried out on the most modern modern computers. The reason is that most computer companies and consumers do not protect the computer with adequate security facilities. But we are aware of this and we are getting closer to the solution


This protects the security of a computer with a defective computer that has been known since 2008 by a gold boot attack. These attacks, once a systematic shutdown, will be re-established and the information in Ram is missing. Such attacks are also available in modern laptops. However, our team has found a way to overcome these shortcomings

Compared to this Gold Bout attack, the process of computer operation takes additional steps, but it is usually said to steal data from modern laptops. This type of threatening laptops applies to stolen or illegally obtained contexts. Cold bout attacks can be made by launching a special program with the USB port.


Many companies are using their laptops without knowing that the attack has taken place. Then one day suddenly their data was missing. 99% corporate companies fear the hacker's intimidation when the data is stolen. It is not easy to get companies from these problems



We recommend preparing an immediate action to face these attacks. Accordingly, if you have a computer or laptop shuttle, just go to the Sleep Mode. At the same time, employees need to know the awareness of the Gold Bout Attack. You should also tell me how to get out of those attacks. IT companies must also follow the ways of retrieving the information if it is stolen

No comments:

Post a Comment