Key Thieves Disturb the Peaceful Xen Garden

What is the sound of one VM hacking?  Quite the racket of interprocess interrupts! Virtualization is an absolute requirement for cloud computing. Researchers are now discovering new ways to subvert virtualization. This is big. Most operating systems tinkerers are familiar with so-called Type 2 or Hosted virtualization.  This is something like VMware Player (or Workstation […]
Read More ›

NFC a Security Risk?

Ever since NFC appeared, I been waiting for it to be used as the basis of an attack. I’m not particularly delighted to report that my concerns have been vindicated: Security researchers at the EuSecWest Conference in Amsterdam demonstrated an attack which allowed them to install any file onto a Samsung Galaxy S3 via NFC. The good […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.