The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.
Windows Server 2016 includes enhanced security features, such as VM encryption capabilities and a minimal Nano Server to reduce the attack surface.
URLZone, a sophisticated banking Trojan that first emerged in 2009, keeps its inner workings under wraps with extensive anti-research features.
IBM X-Force researchers recently studied the GootKit banking Trojan — and the many ways it effectively evades detection and maintains persistence.
Virtual networks are becoming a popular choice for enterprises due to their flexibility, but it's not simple to select the right option.
Ethereum is an updated blockchain technology that could be well-suited for the IoT. But how does it work, and is it a capable solution?
In the final installment of this series, we focus on S$A attacks as well as some ways your organization can prevent side-channel attacks on its VMs.
Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
The VENOM flaw is the latest security vulnerability to come to light. But are you at risk? And how should you react if your data is suceptible to attacks?