We have by now become familiar with the vulnerabilities in Intel and AMD processors and have likely taken steps to mitigate the issues. As to be expected, there are elements out there who attempt to profit from the issues by sending out scam emails purporting to resolve the Meltdown or Spectre vulnerabilities but instead point the victim to a web site.

Both the emails and the fake web sites look genuine and are designed to fool unsuspecting mobile phone and PC users into clicking on a link which will download malware, often in the shape of a Remote Access Trojan (RAT) which will give the malicious attacker the ability to control your device. Totally. And in doing so, gain access to your banking credentials, etc.

Computer companies and government departments will never send out patches in emails. They may advise you to download them, in which case you should enter the URL into your web browser by hand rather than simply clicking on a link.

References: StaySmartOnlineTechRadar

Stay safe,

Terry Griffin

Principal Technologist, Security



Feature Articles


Blog
2024-2025 Government Budget: Focusing investment in cyber security skilling
By Jeremy Daly | 1 July 2024
Blog
The Growing Importance of Management Skills and the AMA CPM Certification in 2024
By Gary Duffield | 29 July 2024
Blog
The ASD’s Essential Eight: How to Implement Cyber Security Strategies with Training
By Leif Pedersen | 14 October 2024
Blog
5 Common RPL Challenges and How to Overcome Them
By Shanil Sharma | 15 August 2024
Blog
Transforming Your Business and Workforce with Microsoft AI Training
By Leif Pedersen | 30 July 2024
Blog
Security maturity is not a technical-only problem - invest in your people
By Jeremy Daly | 11 November 2024