Blog Posts Tagged with "VMware"

7d55c20d433dd60022642d3ab77b8efb

Latest SAP Security News

August 29, 2012 Added by:Alexander Polyakov

The most interesting thing is that the SAP HostControl is exposed to the Internet by many companies. Speaking numbers, 10% of companies that use SAP worldwide expose the SAP HostControl service to the Internet. I think you can imagine what can be done to those companies if hackers exploited this hole...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Crisis Malware Threatens Virtualized Environments

August 24, 2012 Added by:Pierluigi Paganini

Crisis Malware is an agent used to spy on victims by intercepting communications, and it is able to open a backdoor on the infected host once the user executes a JAR file made to look like an Adobe Flash Installer. The malware has been developed for several OSs, and a Mac version has been isolated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VMware Confirms Older Hypervisor Source Code Exposed

April 27, 2012 Added by:Headlines

"Our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe..."

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

Installation of Vendor's Patch Does Not Guarantee Security

March 26, 2012 Added by:Alexander Polyakov

A vulnerability in Lotus Domino was quickly disassembled, and the resulting exploit employed, demonstrating that the existing patch could be bypassed by a critical 0-day vulnerability. The result was an attack on the Domino Controller service and a full server compromise...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Living in the Clouds: Master the Cloud Event - Toronto

February 02, 2012 Added by:Rafal Los

Security is more about understanding the model you'll be undertaking than trying to fit some ideals you have about the cloud security nirvana. Each provider model (IaaS, PaaS, SaaS, etc.) has differing offerings and quirks for security. Watch those contracts closely...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Master the Cloud, Montréal - Notes from the Road Part 2

February 01, 2012 Added by:Rafal Los

As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

A Bunch of Virtual Machines Does Not a Cloud Make

September 09, 2011 Added by:Rafal Los

Allow me to interject some sanity here for a moment, because I seem to have stumbled upon a very interesting point which should be quite clear, but apparently is not. Just because you're running a bunch of virtual servers does not mean you're adopting cloud computing. Here's the situation...

Comments  (0)

6429389c5e8a4c9555be876f8484331a

Guide: A Vulnerability Management Buyer's Checklist

September 07, 2011 Added by:Sasha Nunke

Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities. Qualys provides this free 12-point guide that will help you determine what will work best for your organization...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Solving The End User Problem

July 19, 2011 Added by:Kevin McAleavey

One of the more useful tools for Windows clients was a product called "Steady State." It allowed a system to be "snapshotted" and in the event of malware intrusion, a reboot would restore the client to its previous snapshot. But like most good ideas, Microsoft discontinued it...

Comments  (3)

F520f65cba281c31e29c857faa651872

Desktop Virtualization is Becoming Mainstream

March 18, 2011 Added by:Rahul Neel Mani

Research shows that more than $250 billion worth of energy per year is spent on powering computers around the world. As organizations search for practical and immediate ways to save money and reduce the IT impact on global climate change, they are increasingly turning to virtual PCs...

Comments  (0)

F520f65cba281c31e29c857faa651872

The Public Cloud versus the Private Cloud

January 21, 2011 Added by:Rahul Neel Mani

Peter Coffee, Head of Platform Research for Salesforce.com discusses with Geetaj Channana how the public cloud is like a supermarket and the private cloud is like sticking a shovel in the ground and beginning to grow your own dinner...

Comments  (0)

F520f65cba281c31e29c857faa651872

Virtualization Can Mean Less is More

December 10, 2010 Added by:Rahul Neel Mani

Modern networking and visualization technologies are an opportunity to implement the philosophy that 'less is better,' ensuring a closer-knit functioning of networks and data centers, says Greg Bunt, an Enterprise Architect at Juniper Networks, in an interview with Nipun Sahrawat...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines pt 4 - Targeting a Virtual Machine

December 07, 2010 Added by:Bozidar Spirovski

Identifying that you are attacking a virtual machine can happen in two phases. Before you penetrate the target - identification of a VM can happen if the attacker is on the same LAN, and can therefore investigate the characteristics of the target...

Comments  (0)