We have by now become familiar with the vulnerabilities in Intel and AMD processors and have likely taken steps to mitigate the issues. As to be expected, there are elements out there who attempt to profit from the issues by sending out scam emails purporting to resolve the Meltdown or Spectre vulnerabilities but instead point the victim to a web site.

Both the emails and the fake web sites look genuine and are designed to fool unsuspecting mobile phone and PC users into clicking on a link which will download malware, often in the shape of a Remote Access Trojan (RAT) which will give the malicious attacker the ability to control your device. Totally. And in doing so, gain access to your banking credentials, etc.

Computer companies and government departments will never send out patches in emails. They may advise you to download them, in which case you should enter the URL into your web browser by hand rather than simply clicking on a link.

References: StaySmartOnlineTechRadar

Stay safe,

Terry Griffin

Principal Technologist, Security



Feature Articles


Blog
2024-2025 Government Budget: Focusing investment in cyber security skilling
By Jeremy Daly | 1 July 2024
eBook
Get your teams up-to-speed with ITIL® 4
22 May 2024
eBook
Elevate your business and career to new heights
22 May 2024
Blog
Understanding PRINCE2 Version 6 vs 7: Themes, risks & issue management
By Fred Carenese | 21 May 2024
Blog
How did your incident management plan stand up to the CrowdStrike outage?
By Gary Duffield | 23 July 2024
Blog
How to improve your AWS AI skills with Lumify Work training options
By Leif Pedersen | 3 July 2024
Blog
Transforming Your Business and Workforce with Microsoft AI Training
By Leif Pedersen | 30 July 2024
Blog
The Growing Importance of Management Skills and the AMA CPM Certification in 2024
By Gary Duffield | 29 July 2024