Key Thieves Disturb the Peaceful Xen Garden
What is the sound of one VM hacking? Quite the racket of interprocess interrupts! Virtualization is an absolute requirement for cloud computing. Researchers are now discovering new ways to subvert virtualization. This is big. Most operating systems tinkerers are familiar with so-called Type 2 or Hosted virtualization. This is something like VMware Player (or Workstation […]
NFC a Security Risk?
Ever since NFC appeared, I been waiting for it to be used as the basis of an attack. I’m not particularly delighted to report that my concerns have been vindicated: Security researchers at the EuSecWest Conference in Amsterdam demonstrated an attack which allowed them to install any file onto a Samsung Galaxy S3 via NFC. The good […]