"Knocking Cloud Security off Its Game"
Hardware manufacturers have developed technologies in recent years that should enable organizations to process sensitive data securely using shared cloud computing resources. This approach, known as confidential computing, protects sensitive data while it is being processed by isolating it in a secure area impenetrable to other users and even the cloud provider. However, computer scientists at ETH Zurich have demonstrated that hackers can gain access to these systems and the data stored within them. This article continues to discuss the vulnerability found in cloud server hardware that enables access to data stored in the memories of other active cloud users working with the same hardware.
ETH Zurich reports "Knocking Cloud Security off Its Game"
Submitted by grigby1