desktop-virtualization-community-VDI-UDS-EnterpriseJOIN OUR
COMMUNITY
desktop-virtualization-software-VDI-UDS-Enterprise

TRY OUR SOFTWARE

Open Virtualization Blog


Security Posts

Cyber Security

Cyber ​​threats increased 20% in 2020, exceeding 62.6 billion

Last year all records for cyber threats detected were broken. They exceeded 62.6 billion, a figure that represents an increase of 20% compared to 2019. These data derive from the annual report by T...
READ MORE
Linux security

Google allocates funds to improve Linux kernel security

Google and The Linux Foundation have reached an agreement to improve Linux security. The search engine will allocate funds to finance the work of two kernel developers to focus on tasks aimed at sh...
READ MORE
VDI security

Increase the security of your systems and your data with UDS VDI

Today is the European Data Protection Day. A date established by the European Commission, the Council of Europe and the Data Protection authorities of the member states of the European Union to rai...
READ MORE
Best VDI posts 2020

Top 5: We compile the best posts on VDI technology of 2020

When there are only a few days left to say goodbye to this unusual year, we have compiled the Top 5 of the most read articles in our blog in 2020. As you may know, we strive to keep our readers up-...
READ MORE
PLATYPUS

PLATYPUS: a new threat affecting Intel and AMD CPUs

A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows ...
READ MORE
Network security

Open Source tools to protect enterprise networks

The protection of computer networks against unauthorized access is one of the main handicaps of cybersecurity. It is essential for both system administrators of large corporations and IT managers o...
READ MORE
Kali-Linux

Kali Linux: how to install and use the distro for ethical hacking

Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer fore...
READ MORE
Keyboard with skull

Nearly 9 million cyber threats related to Covid-19 in 6 months

During the first half of this year 2020, the security firm Trend Micro blocked 8.8 million cyber threats that took advantage of Covid-19 to infect computers. Spam through email was the main way use...
READ MORE
open padlock on keyboard

Lockdown security module bypass on Linux

The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 an...
READ MORE
Phishing computer

Covid-19 related phishing campaigns increase 30%

The security firm Check Point warns of a significant increase in the number of cyber-attacks that take advantage of the search for information about the Covid-19 to infect more and more users. Duri...
READ MORE
None

Telecommuting and IT security in the days of Covid-19

The current health crisis, due to the expansion of Covid-19, is responsible for the rise of remote work. The Governments of the affected territories recommend it, and even impose it, and companies ...
READ MORE
None

Google open sources tools to create security keys

Companies and users are increasingly aware of the need to be extremely cautious when surfing the Internet and to properly protect their connected devices. The FIDO security keys are a way to provid...
READ MORE
None

30% of workers will have digital, mobile and secure identity

Coinciding with its 20 years of presence in Spain, the consulting firm IDC Research Spain advanced last week during its Futurescapes 2020 event its technological Predictions for this year. They con...
READ MORE
None

Proton is the first VPN provider that open sources its apps

For the first time, a VPN provider has open sourced the source code of all its Windows, macOS, Android and iOS applications. Proton is the company that has marked this important milestone in the hi...
READ MORE
None

Action required in UDS: configure LDAPS in Active Directory

Microsoft is going to release a security patch through Windows Update next March which will disable certain authentication mechanisms via Lightweight Directory Access Protocol (LDAP) in Active Dire...
READ MORE
None

The new UDS Actor improves VDI security

Security is one of the most important aspects for the UDS Enterprise development team. One of the actions being carried out in this line is the complete redesign of the UDS Actor.
READ MORE
None

Security with VDI, Citrix Ready & UDS in OpenNebulaConf

As every month, in this article we compile the most read posts of our blog, this time during last November. The Case Study of UDS Enterprise and the Municipality of San Martín de Porres (Peru) has ...
READ MORE
None

Linux is the least targeted OS by malvertising

Linux is the safest operating system when it comes to the possibility of receiving malicious advertising campaigns. This conclusion is drawn from a study published by the security firm DEVCON, in w...
READ MORE
None

Oracle introduces the world's first autonomous OS

Oracle announced this week during the event OpenWorld 2019 held in San Francisco the launch of the “first and only autonomous operating system in the world”, according to the words of Larry Ellison...
READ MORE
nsa-security-advisory-windows-legacy-bluekeep

NSA urges to patch legacy versions of Windows

The National Security Agency of the United States (NSA) warns in an advisory to all administrators and users of Windows to check that their system is updated and patched against the latest threats....
READ MORE
hiddenwasp-malware-linux

HiddenWasp: new malware takes remote control of Linux

The cybersecurity company Intezer has discovered a new malware targeting Linux systems. HiddenWasp is a Trojan that allows cybercriminals to take remote control of infected machines. At the moment,...
READ MORE