Post Profile

Rationalizing VM Security: Exploiting DRAMs

When it comes to securing Virtual Machines (VM Security), physical vulnerabilities in memory chips is the Achilles heel amongst all the potential weaknesses currently existing in the cloud computing niche. One of most painful hardware security exploits seen last year was Rowhammer, which was directed towards DRAM. As per the research carried by Mark Seaborn and Thomas Dullien, rowhammer technique works by repeatedly accessing memory rows in DRAM devices to flip bits in adjacent rows as per the post published on the Google Project Zero Blog.
read more


Related Posts

Huge security vulnerability may affect nearly every Android device on the planet

Technology / Gadgets : BGR (Boy Genius Report)

Security researchers claim to have recently discovered a vulnerability in Android that could potentially affect 99% of devices. Bluebox Security revealed that the exploit, which has reportedly existed for the past four years since A...

How Cloud Computing Contributes to Enterprise Mobility?

Mobile / Mobile Apps : Finoit Blog

Cloud computing, one of the most impressive disruptive technologies in the modern day world, has emerged as a welcome respite for individuals and SMBs wishing to find a safe and secure place to store their data, other than their own...

Micron Warns of Tight Memory-Chip Supplies

Technology : Tech -

Micron Technology said it is seeing signs of tight supplies of memory chips, a good omen for the company’s bottom line but a potential worry for makers of smartphones, computers and other high-tech products.

SecludIT will test drive your cloud for security risks before they strike

Technology : Gigaom

Securing the cloud is like trying to secure a long border -- one that's porous and has many potential weak links. When it comes to the cloud, startup SecludIT tries to patch one of those weak spots.

Johnson & Johnson’s insulin pump is totally hackable

Technology : The Next Web Blog

Johnson & Johnson has warned its customers about a security vulnerability in one of its insulin pumps. If the flaw in the Animas OneTouch Ping insulin pump was exploited, it could allow an attacker to deliver a potentially fatal ove...


Copyright © 2016 Regator, LLC