• ¿Le gustaría probar su
    conocimiento en ciberseguridad?

    Complete nuestra quiz y gane una Gift Card de $100 de Amazon

    amazon-gift-card-banner Start the quiz
  •  

    Which of the following is a variant of the Meltdown and Spectre flaws?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What was the biggest threat from the Meltdown and Spectre vulnerabilities?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the processors below wasn’t affected by Meltdown and Spectre?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which devices were threatened by Meltdown and Spectre?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What is speculative execution?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of these vulnerabilities doesn’t belong with the rest?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of these cause and effect scenarios is false?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    A group of computers that are networked together and used by hackers to steal information is called:

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following is the safest password?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following statements about data privacy is false?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What are internet cookies?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following organizations has defined 20 critical security controls to enhance cybersecurity procedures?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What is touted to be the biggest threat to cybersecurity in 2019?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following solutions can help IT security pros be proactive against unforeseen vulnerabilities?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following best practices can help prevent ransomware attacks?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  • You're just a click away from winning the Amazon Gift Card.

    Please share your details to complete the quiz.

    Please enter the valid name. Please enter a name. Please enter a valid email. Please enter a email. Please enter the valid phone. Please enter the phone.
    By clicking 'Register', you agree to the License Agreement and Privacy Policy.
  • Thanks for attending the quiz.

    Here's a freebie for you

    Download free whitepaperAlso, learn more about EMS solutions

    Results will be communicated on Jan 29 to the given email address.

Recordando
Meltdown y Spectre

Caos del 2018

¿Quién no ama el comienzo de un nuevo año? Inicia con las celebraciones y resoluciones de año nuevo. Sin embargo, el inicio de 2018 fue un poco diferente para los administradores de TI. En lugar de centrarse en nuevos comienzos, se vieron obligados a enfrentar el caos.

Fallas de hardware

El 3 de enero de 2018, se descubrieron un par de vulnerabilidades del chip del procesador, y muchos estaban preguntándose sobre la verdadera implicación de estos errores. Estas vulnerabilidades denominadas Meltdown y Spectre eran ajenas al mundo cibernético, ya que su objetivo no era un error de software. En cambio, se enfocaron en las fallas de hardware en los procesadores.

  • + de mil millones de infecciones
  • 7variantes
  • 2vulnerabilidades

¿Cómo se traduce esto ahora?

Los investigadores de seguridad aún consideran a Meltdown y Spectre como dos de las vulnerabilidades más catastróficas, ya que afectaron a casi todas las computadoras fabricadas en las últimas dos décadas. Ambas vulnerabilidades se han solucionado con una gran cantidad de correcciones y actualizaciones por parte de los fabricantes de chips y proveedores de sistemas operativos.

Ha pasado un año desde que se descubrieron estas vulnerabilidades. Aunque Meltdown y Spectre no les han costado a las organizaciones miles de dólares como algunos de los ataques más notables de ransomware, estas vulnerabilidades nos han dado una lección: las vulnerabilidades vienen en todas las formas y tamaños, incluso con las explotaciones más raras.

Cuando recordamos a Meltdown y Spectre, queda una pregunta surge: ¿Su organización está preparada para enfrentar las vulnerabilidades que puedan surgir? Adoptar medidas proactivas, como la implementación automatizada de parches, es una de las mejores formas de abordar las vulnerabilidades críticas en los próximos años.