Interview with Blue Pill creator: Security Threats 3 Levels Beyond Kernel Rootkits

Rutkowska is known for writing Blue Pill to demonstrate how…

“…hardware virtualization technology can be abused by malware to create a stealthy hypervisor and move, on the fly, the running OS into a virtual machine, controlled by this stealthy hypervisor.”

[via:Slashdot]