San Jose Computer Experts Urge Caution After Memory Attack Outbreak

Computer scientists are warning consumers that memory attacks and other so-called fileless exploits have reached an all-time high. Unlike traditional viruses and other types of malware, these attacks don’t require a user to download and run a sketchy application.

Rather, these exploits rely on the ability to write instructions directly to RAM. As a result, they’re capable of attacking mobile devices, PCs and servers with equal severity. Since no actual files are involved, traditional antivirus software isn’t capable of detecting them.

Experts feel that they’ve found ways of reducing the amount of damage caused by these attacks, though they initially had some difficulty pinning down how these attacks kept getting carried out.

What are Memory Attacks

Some programming languages allow the execution of code that hasn’t been compiled yet. Browser scripts and batch processing documents just contain lists of high-level instructions. These are interpreted into executable code at run-time.

Each time a web browser or command prompt comes across one of these instructions, it suddenly converts it into mathematical code and runs it in memory. Attackers can flood these command processors with a great deal of bogus information so that they suddenly fail. Once they do, they can directly inject their problem code into memory.

Once it’s there, it can start to relay personal information back to an outside operator. In fact, computer experts are concerned that there’s some possibility that an attacker could hypothetically do anything once they’ve gained control using this fashion.

However, consumers now have access to tools that can prevent these attacks from occurring.

Firewalls that Block Memory Attacks

Once people started to ask what are memory attacks and scientists came up with an answer, the next step was to develop an effective firewall to stop them. Consumers now have access to the first firewall solution that protects memory at the application layer rather than the file system level, which ensures that applications behave exactly as intended.

For more information, contact the Systems security lab at website.

Be the first to like.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Pin It on Pinterest

    Share This