Clop targets execs, ransomware tactics get another new twist

Ransomware peddlers have come up with yet another devious twist on the recent trend for data exfiltration. After interviewing several victims of the Clop ransomware, ZDNet discovered that its operators appear to be systematically targeting the workstations of executives. After all, the top managers are more likely to have sensitive information on their machines. If this tactic works, and it … [Read more...]

RegretLocker, new ransomware, can encrypt Windows virtual hard disks

Cybersecurity researchers discovered a new ransomware last month called RegretLocker that, despite a no-frills package, can do serious damage to virtual hard disks on Windows machines. Through a clever trick, RegretLocker can bypass the often-long encryption times required when encrypting a machine’s virtual hard disks, and it can close any files currently opened by a user to then encrypt … [Read more...]

How to Clean Up After a Failed Hyper-V Checkpoint

This article explains the formation of Hyper-V's lingering checkpoints and how to safely clean them after a failed checkpoint Read the post here: How to Clean Up After a Failed Hyper-V Checkpoint … [Read more...]

How to Use Azure Spot to Reduce Azure Virtualization Costs

This article explains how Azure Spot can provide a scalable virtualization management solution saving you from using unnecessary VMs. Read the post here: How to Use Azure Spot to Reduce Azure Virtualization Costs … [Read more...]

How to Connect External Physical Disks to a Virtual Machine in Parallels Desktop Business Edition

Parallels Desktop TM for Mac Business Edition enables end users to connect or mount physical disks to a virtual machine (VM) and treat them as internal disks. Why connect external physical disks to VMs? The advantages of being able to connect external physical disks to VMs include: • Increasing the storage of your VM • Installing Windows or another operating system (OS) to … [Read more...]

Technology and the power of moral panic

Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it works its way into the hands of younger generations. Music, games, movies—pretty much anything you can think of is liable to gatecrash the “won’t somebody think of the children?” party no matter how well-meaning or patently silly it is. Last month, a poster was making the rounds … [Read more...]

Isolation Helps Secure Virtual Machines

Virtualization plays a major role in computing in general and is gaining relevance in desktop computing. When in use as test environments or virtualized desktop systems, virtual machines (VMs) may seem to have quite low security requirements at first sight. Acting as so-called sandboxes, VMs are easy to set up and delete again and only present a limited hazard for their host … [Read more...]

How to Use Hyper-V Virtualization on Mac Computers

Virtualization plays a major role in many businesses, though this may not always be immediately apparent to users. Increasingly, the applications they work with will not be running on tangible hardware but rather on virtualized systems. Software developers can also make good use of such virtual machines (VMs).   Microsoft has long embraced this virtualization technology and offers … [Read more...]