We have by now become familiar with the vulnerabilities in Intel and AMD processors and have likely taken steps to mitigate the issues. As to be expected, there are elements out there who attempt to profit from the issues by sending out scam emails purporting to resolve the Meltdown or Spectre vulnerabilities but instead point the victim to a web site.

Both the emails and the fake web sites look genuine and are designed to fool unsuspecting mobile phone and PC users into clicking on a link which will download malware, often in the shape of a Remote Access Trojan (RAT) which will give the malicious attacker the ability to control your device. Totally. And in doing so, gain access to your banking credentials, etc.

Computer companies and government departments will never send out patches in emails. They may advise you to download them, in which case you should enter the URL into your web browser by hand rather than simply clicking on a link.

References: StaySmartOnlineTechRadar

Stay safe,

Terry Griffin

Principal Technologist, Security



Feature Articles


Blog
2024-2025 Government Budget: Focusing investment in cyber security skilling
By Jeremy Daly | 1 July 2024
Blog
AI for Productivity: The 11:11 Tipping Point and Copilot Training
By Leif Pedersen | 19 April 2024
Blog
How to improve communication skills - Power up with Microsoft Copilot training
By Leif Pedersen | 22 April 2024
Blog
Staying on top of AI Trends and Microsoft AI training as a business strategy
By Leif Pedersen | 18 March 2024
eBook
Get your teams up-to-speed with ITIL® 4
22 May 2024
eBook
Elevate your business and career to new heights
22 May 2024
Blog
Understanding PRINCE2 Version 6 vs 7: Themes, risks & issue management
By Fred Carenese | 21 May 2024