Blog Posts Tagged with "VMware"
August 29, 2012 Added by:Alexander Polyakov
The most interesting thing is that the SAP HostControl is exposed to the Internet by many companies. Speaking numbers, 10% of companies that use SAP worldwide expose the SAP HostControl service to the Internet. I think you can imagine what can be done to those companies if hackers exploited this hole...
August 24, 2012 Added by:Pierluigi Paganini
Crisis Malware is an agent used to spy on victims by intercepting communications, and it is able to open a backdoor on the infected host once the user executes a JAR file made to look like an Adobe Flash Installer. The malware has been developed for several OSs, and a Mac version has been isolated...
April 27, 2012 Added by:Headlines
"Our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe..."
March 26, 2012 Added by:Alexander Polyakov
A vulnerability in Lotus Domino was quickly disassembled, and the resulting exploit employed, demonstrating that the existing patch could be bypassed by a critical 0-day vulnerability. The result was an attack on the Domino Controller service and a full server compromise...
February 02, 2012 Added by:Rafal Los
Security is more about understanding the model you'll be undertaking than trying to fit some ideals you have about the cloud security nirvana. Each provider model (IaaS, PaaS, SaaS, etc.) has differing offerings and quirks for security. Watch those contracts closely...
February 01, 2012 Added by:Rafal Los
As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...
September 09, 2011 Added by:Rafal Los
Allow me to interject some sanity here for a moment, because I seem to have stumbled upon a very interesting point which should be quite clear, but apparently is not. Just because you're running a bunch of virtual servers does not mean you're adopting cloud computing. Here's the situation...
September 07, 2011 Added by:Sasha Nunke
Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities. Qualys provides this free 12-point guide that will help you determine what will work best for your organization...
July 19, 2011 Added by:Kevin McAleavey
One of the more useful tools for Windows clients was a product called "Steady State." It allowed a system to be "snapshotted" and in the event of malware intrusion, a reboot would restore the client to its previous snapshot. But like most good ideas, Microsoft discontinued it...
March 18, 2011 Added by:Rahul Neel Mani
Research shows that more than $250 billion worth of energy per year is spent on powering computers around the world. As organizations search for practical and immediate ways to save money and reduce the IT impact on global climate change, they are increasingly turning to virtual PCs...
January 21, 2011 Added by:Rahul Neel Mani
Peter Coffee, Head of Platform Research for Salesforce.com discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...
December 10, 2010 Added by:Rahul Neel Mani
Modern networking and visualization technologies are an opportunity to implement the philosophy that 'less is better,' ensuring a closer-knit functioning of networks and data centers, says Greg Bunt, an Enterprise Architect at Juniper Networks, in an interview with Nipun Sahrawat...
December 07, 2010 Added by:Bozidar Spirovski
Identifying that you are attacking a virtual machine can happen in two phases. Before you penetrate the target - identification of a VM can happen if the attacker is on the same LAN, and can therefore investigate the characteristics of the target...
Join Trend Micro & SecurityWeek in Belle... Shah Alam on 12-06-2013
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013