Virtual PC Hypervisor vulnerability remains unpatched

Virtual PC Hypervisor vulnerability remains unpatched


Virtual PC Hypervisor vulnerability remains unpatched

Posted: 16 Mar 2010 01:22 PM PDT

Core Security issued an advisory disclosing a vulnerability that could affect large numbers of organizations and consumers using Microsoft's Virtual PC virtualization software and leave them open to p...

Chrome unique IDs removed after first update

Posted: 16 Mar 2010 11:06 AM PDT

Google decided to appease privacy advocates by making the "unique ID" feature "disappear" when the Chrome browser checks for updates for the first time after the installation. The feature is used t...

Facebook removes "stalker" apps

Posted: 16 Mar 2010 09:59 AM PDT

A short-lived resurgence of "stalker" applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their friends to try out an application th...

Mac OS X ransomware - just a matter of time?

Posted: 16 Mar 2010 08:03 AM PDT

For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and the users are susceptible ...

FBI: Online fraud loss was $559 million in 2009

Posted: 16 Mar 2010 07:03 AM PDT

Online crime complaints increased substantially once again last year, according to a report about fraudulent activity on the Internet from the Internet Crime Complaint Center (IC3), a partnership betw...

Intel launches its most secure data center processor

Posted: 16 Mar 2010 06:29 AM PDT

Combining security, performance and energy efficiency, Intel launched the Intel Xeon Processor 5600 series which deliver two new security features -- Intel Advanced Encryption Standard New Instruction...

Six common virtualization security risks and how to combat them

Posted: 16 Mar 2010 05:50 AM PDT

Through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace, according to Gartner. Although they expect this figure to fall to 30 percent by the end of 2...

Implement the SSH-2 protocol in pure Java

Posted: 16 Mar 2010 04:13 AM PDT

Ganymed SSH-2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java programs. It supports S...

The smart grid, it's all about security

Posted: 16 Mar 2010 12:12 AM PDT

All too often you read about security breaches that cost firms millions of dollars or hit individuals with loss of personal data or both. But all this pales in comparison when you consider the implica...

Blazing fast password recovery with new ATI cards

Posted: 16 Mar 2010 12:06 AM PDT

ElcomSoft accelerates the recovery of Wi-Fi passwords and password-protected iPhone and iPod backups by using ATI video cards. The support of ATI Radeon 5000 series video accelerators allows ElcomSoft...

New hosted email security platform from Trend Micro

Posted: 15 Mar 2010 09:40 PM PDT

Trend Micro introduced Hosted Email Security – based on a new platform – which will create a new mission-critical service standard for what small and large customers should expect from their hosted em...

0 comments:

Post a Comment