4/9/08

Is Virtualization The Biggest Security...

â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€" â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€"â€" The question is asked by Senior Reporter from Forbes Andy ... of virtualization-based <strong class="keyword">malware</strong> that could be used to take control of a machine running virtualization<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://virtualization.com">Virtualization.com - News, reports & insights</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fvirtualization.com" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 292 links from 50 sites</a>) by <a rel="nofollow" class="byline" title="View virtualizationdotcom's profile">virtualizationdotcom</a><br /><br /><img width="1" height="1" src="http://static.technorati.com/y/1299269200.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wxfGh0dHA6Ly92aXJ0dWFsaXphdGlvbi5jb20vaW50ZXJ2aWV3cy1pbnRlcnZpZXctdGFsay8yMDA4LzA0LzA5L2lzLXZpcnR1YWxpemF0aW9uLXRoZS1iaWdnZXN0LXNlY3VyaXR5LXZ1bG5lcmFiaWxpdHktaW4taXQtdG9kYXkvJnZpc2l0b3JpZD0tJnVzZXJpZD0tJnNlc3Npb25pZD0xNTgyMjE3ZWJkMTMzNmNiM2Y2YjAwZGJmYTZkMmI3NCZ1c2VyY2xhc3M9MSZhYmNsYXNzPWEmYWJzd2l0Y2g9MiZtZW1iZXI9LQ=="/>