Thursday, May 07, 2009

VMware hole: A Windows VM can control the host; Microsoft lays off 3,000, not done yet

Microsoft Imagine Cup U.S. finals: Team Multipoint wins; Imagine Cup video coverage
Network World logo

Microsoft Alert

NetworkWorld.com | Software Research Center | Update Your Profile


Sponsored by Dell
rule

WS08 Hyper-V Reference Architecture
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008(r) Hyper-V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the virtualization solution components that best fit their requirements.

rule

Spotlight Story

VMware hole: A Windows VM can control the host
A few weeks ago, VMware announced a patch for a critical vulnerability in the virtual machine display function. The hole could allow a guest operating system to run code on the host. The bug affects just about all of VMware products, including Fusion and ESX. If this bug were exploited, it would allow an attacker to jump out of say a Windows XP VM instance down to your host system, say Mac OSX or Windows XP. A security researcher, and guest blogger for Microsoft Subnet, says that virtualization users should take note: this type of attack is the Holy Grail for any VM hacker and the worst-case scenario for the host VM owner.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Microsoft lays off 3,000, won't be done until June, 2010, says Ballmer Microsoft Subnet reports that Microsoft Tuesday commenced 3,000 layoffs, but won't be done with the cutting of headcount until June, 2010, according to an e-mail attributed to CEO Steve Ballmer.

Windows 7 RC's 'free' reign to end with auto-shutdowns What Microsoft gives, it takes away.

Microsoft's Windows 7 release candidate goes public The near-final version of Microsoft's next operating system, Windows 7, became available late Monday to the general public.

Microsoft to forbid VoIP, rival stores at mobile market VoIP applications will be forbidden from Microsoft's Windows MarketPlace for Mobile store, along with programs that are larger than 10MB or that
change the default browser on a device.

Microsoft mum on Vista plans after Windows 7 launch How long does Microsoft plan to keep selling copies of its Windows Vista operating system after the upcoming launch of Windows 7? The company isn't saying.

Microsoft unveils its first online management service Microsoft has unveiled System Center Online Desktop Manager, the first online service built around its management tools.

Microsoft responds to EU over antitrust charges: let's talk Microsoft Subnet reports that Microsoft has finally submitted a response to the European Commission over the EC's findings that the company violated antitrust regulations. The company has requested an oral hearing where it will defend itself.

Oracle aims at Microsoft with upgraded Beehive collaboration Oracle today announced enhancements to its recently launched Beehive collaboration software in hopes of positioning it more strongly against long-established offerings from Microsoft and IBM.

Microsoft's Windows 7 release candidate goes public The near-final version of Microsoft's next operating system, Windows 7, became available late Monday to the general public.

Using offshore certified Microsoft partners? Beware of security holes Microsoft Subnet was last week contacted by a reader from Croatia who was shocked to discover a gaping security hole in a product being sold
worldwide by one of the country's premier Microsoft partners.

Microsoft Imagine Cup U.S. finals: 

Team Multipoint wins The Microsoft Subnet has video of a team of brothers who won the U.S. finals of the Microsoft Imagine Cup on Tuesday, and two others, to make you feel like you were there.

Imagine Cup video coverage:

Solving world problems through software
Microsoft's Imagine Cup, now in its seventh year, allows high school and university students worldwide to develop software in hopes of solving global problems. The U.S. finals were held recently in Boston.

Multipoint moves on
A team of 3 brothers was named the U.S. winners of Microsoft’s Imagine Cup on Tuesday. They’ll now head to Egypt to compete against other teams from around the world in a software design competition that hopes to solve global problems.

Cell phones record erratic driving
A team of students competing in this year’s Microsoft Imagine Cup developed a system that blocks cell phone calls and text messages while driving, but one that also gathers information about driving habits like rapid starts stops and turns.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

WS08 Hyper-V Reference Architecture
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008(r) Hyper-V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the virtualization solution components that best fit their requirements.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09.
Register now, attend free

 

05/07/09

Today's most-read stories:

  1. Domain name company cries croc tears over 'censorship'
  2. Why BlackBerry still beats iPhone for some
  3. Death of the mouse
  4. Leaked copies of Windows 7 RC contain Trojan
  5. RIM to bind BlackBerry to Cisco phones
  6. Top 7 reasons people quit Linux
  7. Citrix embraces Apple with iPhone virtualization
  8. Give users passwords they don't have to remember
  9. Cisco cool to Obama's tax loophole plan
  10. Use the Cisco restroom at your own risk
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment