LeadFistExpress writes: Researchers have found, and demonstrated, how to use a virtual machine to steal the cryptographic keys from another virtual machine on the same host. This exploit could cause the attacking VM to have access to all communications from the victim VM. Could this revelation result in customers of public cloud providers to demand dedicated "air-gapped" hardware for their resources?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's now on IFTTT. Check it out! Check out the new SourceForge HTML5 Internet speed test! ×