From 0df20f3e7981bdb8a062ad78df566d566d27f13c Mon Sep 17 00:00:00 2001 From: GentlemanlyHippo <44386311+GentlemanlyHippo@users.noreply.github.com> Date: Tue, 19 Feb 2019 01:23:45 -0500 Subject: [PATCH] Add hardware flaws as a way to attack (#26607) * Add hardware flaws * Grammar fix --- guide/english/security/cyberattacks/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/guide/english/security/cyberattacks/index.md b/guide/english/security/cyberattacks/index.md index 491d12b8ba..27d56579ee 100644 --- a/guide/english/security/cyberattacks/index.md +++ b/guide/english/security/cyberattacks/index.md @@ -19,7 +19,7 @@ In 2017, a Ukrainian government website was infected with malware that erases vi One of the biggest cyberattacks to date is the Yahoo hack, this affected all 3 billion user accounts. The hack was dangerous, as it exposed users names, email addresses, telephone numbers, DOB, encrypted passwords and unencrypted security questions. This attack proves that no matter how big a company is, -no one can be 100% that their data is secure. +no one can be 100% that their data is secure. There are also hardware hacks, i.e. holes in hardware that people with malicious intent can abuse. Some recent examples of this are the widely known Meltdown and Spectre incidents which accidentally allowed websites access to memory that they shouldn't have access to. ## Common Types of Cyberattacks * Malware