Tag Archive for: holding

This McDonald’s hack for holding your whole meal with one hand is a game changer

But did you know there’s a simple hack to make a McDonald’s on foot even easier to handle? Download the Microsoft News app for your Android or iPhone device and get news & live updates on the go. Bala…
mac hacker – read more

Holding down the Enter key can smash through Linux’s defenses

Got 70 seconds? Holding down the Enter key can smash through Linux's defenses

An attacker can abuse a vulnerability to launch a shell with root privileges on most Linux machines… just by holding down the ‘Enter’ key for 70 seconds.

David Bisson reports.

Graham Cluley

Hacker Tactic: Holding Data Hostage – New York Times


New York Times

Hacker Tactic: Holding Data Hostage
New York Times
THE perpetual cat-and-mouse game between computer hackers and their targets is getting nastier. Cybercriminals are getting better at circumventing firewalls and antivirus programs. More of them are resorting to ransomware, which encrypts computer data …

and more »

“computer security” – read more

Bromium secures computers by holding apps in isolation

Bromium, is releasing software today that could mean the end of computer malware as we know it. They call the software product vSentry and they call the underlying tech the Bromium microvisor.

Essentially this tech gives you a “disposable virtual computer” for every task you do on a Windows PC, cofounder Gaurav Banga told Business Insider. (They will have a version for Macs, too, in a couple of months.)

Think of it like having a thin sheet of glass between each Window and the guts of your PC. So when you go to Facebook, you get a piece of glass, when you check e-mail, you get a new piece of glass and so on. If your computer picks up a virus from e-mail or the ‘net, no matter. It can’t bust through the glass and infect the actual computer. The virus dies when you close the window.

Source: Startup Bromium Could End Computer Viruses Forever

What if you could remove every single restriction, compliance measure, and black list from your IT policy without adding risk to your enterprise?

All software is vulnerable, and all users make mistakes. The result is a recipe for disaster. And so the challenge for IT has always been this: How do we limit risk to the enterprise without disempowering users or damaging their productivity?

In other words, how do we deliver a desktop that embraces both security and freedom?

With Bromium micro-virtualization, we now have an answer: A desktop that is utterly secure and a joy to use. Micro-virtualization uses hardware isolation to securely allow untrustworthy desktop tasks to safely coexist with trusted enterprise applications and data – without risk, with an unchanged user experience.

Inspired by the isolation principles of traditional virtualization, the Bromium Microvisor uses hardware virtualization to automatically, instantly and invisibly isolate each untrustworthy task within a tiny micro-VM that has no access to enterprise data or networks, and which cannot modify the desktop.

Bromium