• Would you like to test
    your cybersecurity awareness?

    Try out our quiz and stand a chance to win a $100 Amazon Gift Card

    amazon-gift-card-banner Start the quiz
  •  

    Which of the following is a variant of the Meltdown and Spectre flaws?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What was the biggest threat from the Meltdown and Spectre vulnerabilities?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the processors below wasn’t affected by Meltdown and Spectre?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which devices were threatened by Meltdown and Spectre?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What is speculative execution?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of these vulnerabilities doesn’t belong with the rest?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of these cause and effect scenarios is false?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    A group of computers that are networked together and used by hackers to steal information is called:

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following is the safest password?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following statements about data privacy is false?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What are internet cookies?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following organizations has defined 20 critical security controls to enhance cybersecurity procedures?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    What is touted to be the biggest threat to cybersecurity in 2019?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following solutions can help IT security pros be proactive against unforeseen vulnerabilities?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  •  

    Which of the following best practices can help prevent ransomware attacks?

    Clicking on the "Next" button will pass you on to the next question and the selection for the current question can't be edited. So, please make sure the selected option is final.

  • You're just a click away from winning the Amazon Gift Card.

    Please share your details to complete the quiz.

    Please enter the valid name. Please enter a name. Please enter a valid email. Please enter a email. Please enter the valid phone. Please enter the phone.
    By clicking 'Register', you agree to the License Agreement and Privacy Policy.
  • Thanks for attending the quiz.

    Here's a freebie for you

    Download free whitepaperAlso, learn more about EMS solutions

    Results will be communicated on Jan 29 to the given email address.

Remembering
Meltdown & Spectre

Chaos of 2018

Who doesn't love the start of a fresh year? It brings New Year’s celebrations and resolutions. However, the start of 2018 was a bit different for IT administrators. Instead of focusing on new beginnings, they were forced to face chaos.

Hardware flaws

On January 3, 2018, a couple of processor chip vulnerabilities were discovered, and many were left scratching their heads about what these bugs actually entailed. These vulnerabilities, dubbed Meltdown and Spectre, were alien to the cyber world, as they didn't target any software bugs. Instead, they targeted hardware flaws in processors.

  • 1 Billion+Infections
  • 7Variants
  • 2Vulnerabilities

How it translates now?

Security researchers still regard Meltdown and Spectre as two of the most catastrophic vulnerabilities, as they affected nearly every single computer built in the last two decades. Both vulnerabilities have been addressed with a bevy of fixes and updates from chip manufacturers and OS vendors.

It's been a year since these vulnerabilities were discovered. Although Meltdown and Spectre haven’t cost organizations thousands of dollars like some of the more noteworthy ransomware attacks, these vulnerabilities have taught us a lesson: vulnerabilities come in all shapes and sizes, even with the rarest of exploitations.

As we look back at Meltdown and Spectre, one question remains: is your organization prepared to face whatever vulnerabilities might come its way? Following proactive measures like automated patch deployment is one of the best ways to address critical vulnerabilities in the coming years.