LeadFistExpress writes: Researchers have found, and demonstrated, how to use a virtual machine to steal the cryptographic keys from another virtual machine on the same host. This exploit could cause the attacking VM to have access to all communications from the victim VM. Could this revelation result in customers of public cloud providers to demand dedicated "air-gapped" hardware for their resources?
Attend or create a Slashdot 20th anniversary party! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×