2007.03.12 Daily Security Reading
by Rodney Campbell on Mar.12, 2007, under Security
SubVirt: Implementing malware with virtual machines (pdf)
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-level, operating system code. In this paper, we assume the perspective of the attacker, who is trying to run malicious software and avoid detection.
Your DNS is a sweet spot for hackers who want to compromise your network; learn to protect it.
One-third of security IT/security managers don’t secure their home machines
A survey of security and IT managers at the recent RSA conference shows that one-third don’t secure their home files or communications.