8.7 C
London
Wednesday, September 20, 2017
Home Tags Operating systems

Tag: operating systems

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code.

At Kaspersky Lab, we have several sandboxes, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform.
Apple's limits on tracking will "sabotage the economic model for the Internet."
A collection of Bluetooth implementation vulnerabilities known asBlueBornehas been released.

These vulnerabilities collectively affect Windows,iOS,and Linux-kernel-based operating systems including Android and Tizen,and may in worst case allow an unauthenticated attacker to perform commands on the device.
Cloud computing isnrsquo;t one monolithic type of offering, but an assortment of services aimed at meeting the various IT needs of an organization.One such service provided via the cloud is infrastructure-as-a-service (IaaS), which delivers virtualized computing resources to organizations typically via the internet.
IaaS is one of main types of cloud services, along with software-as-a-service (SaaS) and platform-as-a-service (PaaS).[ What is cloud computing? Everything you need to know now. | Also: InfoWorldrsquo;s David Linthicum explains how to move into a cloud career from traditional IT. | Download the public cloud megaguide PDF: Amazon, Microsoft, Google, IBM, and Joyent compared. ]In the IaaS model, third-party service providers host hardware equipment, operating systems and other software, servers, storage systems, and various other IT components for customers in a highly automated delivery model.
In some cases, they also handle tasks such as ongoing systems maintenance, data backup, and business continuity.To read this article in full or to leave a comment, please click here
The Facebook malware that spread last week was dissected in a collaboration with Kaspersky Lab and Detectify. We were able to get help from the involved companies and cloud services to quickly shut down parts of the attack to mitigate it as fast as possible.
Booby-trapped touchscreens can log passwords, install malicious apps, and more.
With the newest Docker Enterprise Edition, you can now have Docker clusters composed of nodes running different operating systems.Three of the key OSes supported by Docker -- Windows, Linux, and IBM System Z -- can run applications side by side in the same cluster, all orchestrated by a common mechanism.[ What is Docker? Linux containers explained. | Go deeper with InfoWorldrsquo;s beginnerrsquo;s guide to Docker. ]Clustering apps across multiple OSes in Docker requires that you build per-OS images for each app.

But those apps, when running on both Windows and Linux, can be linked to run in concert via Docker's overlay networking.To read this article in full or to leave a comment, please click here
Wi-Fi chips used in iPhones and Android may revive worm attacks of old.
We recently reported about SambaCry, a new family of Linux Trojans exploiting a vulnerability in the Samba protocol.

A week later, Kaspersky Lab analysts managed to detect a malicious program for Windows that was apparently created by the same group responsible for SambaCry.
Time to upgrade that decade-old operating system, man.
Likely the final updates before macOS High Sierra and iOS 11 become available.
The Adwind Trojan can conduct espionage on operating systems including Windows, Mac OSX, Linux and Android.