desktop-virtualization-community-VDI-UDS-EnterpriseJOIN OUR
COMMUNITY
desktop-virtualization-software-VDI-UDS-Enterprise

TRY OUR SOFTWARE

Open Virtualization Blog


Security Posts

None

Open Source automatic analysis tool for Flash available

FireEye has released an Open Source tool to automate the analysis of SWF files in Flash. It’s called FLASHMINGO and it enables analysts to triage suspicious Flash samples and investigate them furth...
READ MORE
None

US develops an Open Source voting system

The Defense Advanced Research Projects Agency (DARPA) of United States is committed to develop a 100% Open Source voting system to restore citizens' trust in the counting system. The objective of...
READ MORE
None

Linux lands on critical systems with the Elisa project

The Linux Foundation has launched a project to guarantee the security of critical systems using Linux. It’s called it ELISA (Enabling Linux in Safety Applications) and its objective is to create an...
READ MORE
None

The Spanish Football Federation prevents resale with blockchain

The Royal Spanish Football Federation (RFEF) has developed together with the Nodalblock company a ticket tracking system based on blockchain . This technology will allow activating and monitoring t...
READ MORE
None

SpeakUp, new Trojan affecting Linux and macOS

Security experts at Check Point have discovered a new Trojan that exploits vulnerabilities in six Linux distributions and macOS devices. This malware is able to implement a backdoor in the system t...
READ MORE
None

How to encrypt files in Linux with Tomb

Data security is undoubtedly one of the aspects that most concerns both private users and organizations. If you are a GNU / Linux user, Tomb may be the tool you were looking for. It’s a free and Op...
READ MORE
None

How to protect against zero-day vulnerability in VirtualBox

Security researcher Sergey Zelenyuk has discovered a zero-day vulnerability in VirtualBox, the Open Source virtualization software developed by Oracle. This failure allows malware to leave the virt...
READ MORE
None

Fully persistent virtual desktops with UDS Enterprise

The latest release of the VDI and vApp connection broker vApp UDS Enterprise 2.2 introduces a new concept in the configuration of virtual desktops: persistent desktops at user level. This new devel...
READ MORE
None

New vulnerability affects Intel X86 processors

After the soaring problems with the Meltdown and Specter, Intel is once again experiencing security-related issues. This time it is a vulnerability called Lazy FP State Restore, which affects the I...
READ MORE
None

Install SSL certificates in UDS Enterprise

Making a secure connection to any web page or server is nowadays essential, since there are many illicit practices that pursue the objective of subtracting sensitive information from users. When it...
READ MORE
None

New Spectre variants affecting Intel chips

Eight new variants of Spectre affecting Intel chips have been found by a team of security researchers. These new vulnerabilities have been named Spectre Next Generation and make it possible to run ...
READ MORE
None

Microsoft announces its first Linux-based OS

Microsoft continues to take steps to get closer to Linux supporters. The latest surprise was the announcement of Azure Sphere, an operating system , based on Linux, whose objective is to improve th...
READ MORE
None

Open Source Security Software Hackathon

On Monday, March 26 Luxembourg will host the third edition of the Open Source Security Software Hackathon. The event, organized by the hack.lu team will bring groups of developers together to work ...
READ MORE
None

Linux distros to clone and copy disks

When our computer stops working, the disk is damaged, we suffer a data loss from the main unit or it becomes infected with a virus, we look for a fast and effective solution. Since prevention is be...
READ MORE
None

How to secure your Linux file system

Although Linux is considered the safest operating system, it has recently been proven that it is not always safe from vulnerabilities. Therefore, it is important to adopt security measures that gua...
READ MORE
None

VDI to protect critical data according to EU

In May of this year 2018 the General Data Protection Regulation (GDPR) will enter into force, which will be mandatory in all countries of the European Union. This new regulation will affect all co...
READ MORE
None

UDS Enterprise, safe from Meltdown & Spectre

Since the beginning of the year, the alarms about the existence and effects of Meltdown and Spectre have been raised, news related to these attacks do not stop popping out. The latest information s...
READ MORE
None

State of Open Source Security 2017

The company Snyk has released a report that analyzes The State of Open Source Security focusing on three main areas: the Open Source panorama, the life cycle of a vulnerability detected in Open Sou...
READ MORE
None

Balance VDI user experience and security

In the world of VDI, balance is also essential when it comes to user experience and security. Unfortunately for VDI administrators, there is no all-powerful chosen one who can swoop in and deliver ...
READ MORE
None

A successful print security plan in 8 steps

Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network. As IoT devices they are susceptible to the growin...
READ MORE
None

If you need privacy you need to run Linux

Millions of IT professionals have been praising desktop Linux for ages for some reasons that privacy is a new one of them. Chrome OS and Android, for example, are Linux distributions, but they perf...
READ MORE