VMware Releases Security Update

Original release date: December 20, 2016

VMware has released a security update to address a vulnerability in vSphere Hypervisor (ESXi). Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.US-CER…

Original release date: December 20, 2016

VMware has released a security update to address a vulnerability in vSphere Hypervisor (ESXi). Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review VMware Security Advisory VMSA-2016-0023 and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.


Op-ed: Why I’m not giving up on PGP

(credit: Aurich Lawson / Thinkstock) Neal H. Walfield is a hacker at g10code working on GnuPG. This op-ed was written for Ars Technica by Walfield, in response to Filippo Valsorda’s “I’m giving up on PGP” story that was published on Ars last week.

(credit: Aurich Lawson / Thinkstock)

Neal H. Walfield is a hacker at g10code working on GnuPG. This op-ed was written for Ars Technica by Walfield, in response to Filippo Valsorda's "I'm giving up on PGP" story that was published on Ars last week.

Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."

In this article I want to respond to the points that Filippo raises. In short, Filippo is right about some of the details, but wrong about the big picture. For the record, I work on GnuPG, the most popular OpenPGP implementation.

Read 21 remaining paragraphs | Comments