<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>MozDomains Blog</provider_name><provider_url>https://www.mozdomains.co.mz/blog/en</provider_url><author_name>Momed Jussub</author_name><author_url>https://www.mozdomains.co.mz/blog/en/author/momed-jussub/</author_url><title>Rowhammer Data Hack - MozDomains Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="mVGOYEi1s0"&gt;&lt;a href="https://www.mozdomains.co.mz/blog/en/website-security/rowhammer-data-hack/"&gt;Rowhammer Data Hack&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.mozdomains.co.mz/blog/en/website-security/rowhammer-data-hack/embed/#?secret=mVGOYEi1s0" width="600" height="338" title="&#x201C;Rowhammer Data Hack&#x201D; &#x2014; MozDomains Blog" data-secret="mVGOYEi1s0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.mozdomains.co.mz/blog/en/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.mozdomains.co.mz/blog/en/wp-content/uploads/2019/03/shutterstock_152931572.0.jpg</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>800</thumbnail_height><description>Rowhammer refers to a data theft technique that has captivated and worried the cybersecurity community for years because of the fact that it combines physical and digital hacking in ways that are both unaccounted for and fascinating. Since its initial discovery, researchers have constantly refined the attack, and even expanded the range of targets it works against. Researchers have significantly increased the scope of the potential threat to include vital devices like and routers and servers&#x2014;even when they comprise of components that were precisely assumed to be immune. Rowhammer attacks are known to be a brutal data hack technique. They&#x2026;</description></oembed>
