Discussion in 'other security issues & news' started by ronjor, May 13, 2015.
Thanks for sharing. Luckily I don't have any floppy controller added to my virtual machines. Never had any use of it.
From the link in the first post:
""Virtualized Environment Neglected Operations Manipulation"
Is that a description which at all describes how it actually does it's dirty work? If so, thinking how odd to have an attack method have an acronym that is an appropriate word.
Maybe hackers now just choose a vicious word and reverse engineer to create their attack malware
"Bigger than Heartbleed" is not saying very much... And yeah, how many data centers are using floppy emulation in their VMs?
Experts' Opinions Mixed On VENOM Vulnerability