Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels.

However, a separate team of security researchers has now demonstrated a second network-based remote Rowhammer technique that can be used to attack systems using

http://feedproxy.google.com/~r/TheHackersNews/~3/ONy4Kjx0gdo/remote-rowhammer-attack.html