1. Bullet04/06/2010: NetworkWorld Open Source OS Featuring "Throw Away" VMs Could Solve Your Security Problems

  2. Bullet03/06/2010: DarkReading New Open-Source OS Will Feature 'Disposable' Virtual Machines

  3. Bullet03/06/2010: OSNews Qubes To Implement Disposable Virtual Machines

  4. Bullet03/06/2010: ZDNet Rutkowska's Qubes OS to implement disposable VMs

  5. Bullet02/06/2010: The H (Heise) Qubes to implement "Disposable VMs"

  6. Bullet05/05/2010: LWN Qubes: security by virtualization

  7. Bullet08/04/2010: Forrester Blog Qubes Os: The Bento Security Model In Action

  8. Bullet07/04/2010: The H (Heise) Security through virtualisation

  9. Bullet07/04/2010: geek.com Open source, security-focused Qubes OS hits alpha

  10. Bullet07/04/2010: NetworkWorld Open source Qubes OS alpha available

  11. Bullet07/04/2010: TG Daily Qubes OS - virtualizing away software threats

  12. Bullet07/04/2010: ThreatPost (Kaspersky) Researcher Releases 'Qubes' Hardened OS

  13. Bullet07/04/2010: Slashdot Researcher Releases Hardened OS "Qubes"; Xen Hits 4.0

  14. Bullet23/12/2009: eSecurity Planet Intel Patches Trusted Execution

  15. Bullet22/12/2009: Help Net Security, Intel patches flaws in its Trusted Execution Technology

  16. Bullet22/12/2009: The Register, Intel patches critical security bug in vPro software (slashdot)

  17. Bullet28/10/2009: LWN, "Evil Maid" attack against disk encryption

  18. Bullet27/10/2009: TehRepublic, Evil Maid: Road warriors beware

  19. Bullet23/10/2009: Schneier on Security, "Evil Maid" Attacks on Encrypted Hard Drives (slashdot)

  20. Bullet19/10/2009: ZDNet, 'Evil Maid' USB stick attack keylogs TrueCrypt passphrasess

  21. Bullet19/10/2009: PGP Blog, Evil Maid Attack

  22. Bullet30/07/2009: The Register, Intel warns over bare-metal BIOS bug

  23. Bullet29/07/2009: ZDNet, Intel motherboards suffer Bios flaws

  24. Bullet16/07/2009: Tom’s Hardware, Going Three Levels Beyond Kernel Rootkits (slashdot)

  25. Bullet24/03/2009: Heise, Attacks on Intel's System Management Mode

  26. Bullet20/03/2009: eWeek, Intel Chip Vulnerability Could Lead to Stealthy Rootkits

  27. Bullet20/03/2009: SC Magazine, Intel CPU exploit threatens PCs worldwide

  28. Bullet19/03/2009: Slashdot, Intel CPU Privilege Escalation Exploit (slashdot)

  29. Bullet19/03/2009: Internet News, Researchers Warn on Security Flaw in x86 Chips

  30. Bullet19/03/2009: The Register, Intel chip flaw gets double exposure

  31. Bullet18/02/2009: ComputerWorld, Researchers detail Intel TXT hacks at Black Hat

  32. Bullet08/01/2009: Heise, Intel’s Trusted Execution Technology hacked in the alpha stage

  33. Bullet07/01/2009: Government Computer News, Researchers to compromise vPro

  34. Bullet07/01/2009: Ars Technica, Root inside: researchers claim crack for Intel's vPro

  35. Bullet07/01/2009: The Register, Researchers poke holes in Intel's anti-tampering tech

  36. Bullet07/01/2009: The Tech Herald, Researchers circumvent security on Intel’s vPro

  37. Bullet06/01/2009: SecurityFocus, Researchers claim flaws in Intel's trusted platform

  38. Bullet05/01/2009: ComputerWorld, Researchers hack into Intel's vPro (slashdot)

  39. Bullet27/08/2008: ZDNet, Intel ships BIOS fix for Rutkowska's Black Hat flaw

  40. Bullet27/08/2008: PC Magazine, Intel Patches BIOS Security Bug

  41. Bullet14/08/2008: Xen.org blog, Xen security research results presented

  42. Bullet13/08/2008: Heise, Xen virtualisation swallows a Blue Pill

  43. Bullet01/08/2008: Government Computer News, Virtualization showdown at Black Hat

  44. Bullet28/07/2008: Government Computer News, Securing the virtual world

  45. Bullet08/07/2008: Information Week, Hacking The Hypervisor

  46. Bullet08/07/2008: Virtualization.com, Invisible Things Lab: Hypervisors Mucho Hackable

  47. Bullet09/04/2008: Forbes, Virtualization's Dark Side

  48. Bullet04/04/2008: Computer Security Institute, Virtualization and Security: The Full Story

  49. Bullet03/03/2008: Reuters, RSA Conference 2008 Adds "Research Revealed" Track

  50. Bullet25/10/2007: Dark Reading, Phoenix Partners With Rutkowska in Securing Hypervisor

  51. Bullet17/09/2007: The Register, Build malware protection into operating systems

  52. Bullet21/08/2007: ZDNet, Can Microsoft ever stop kernel tampering in Vista?

  53. Bullet09/08/2007: ZDNet, ATI driver flaw exposes Vista kernel to attackers

  54. Bullet04/08/2007: eWeek, Rutkowska Gets Last Laugh in Rootkit Cat-and-Mouse Game

  55. Bullet03/08/2007: Computer World, An antidote for the Blue Pill?

  56. Bullet02/08/2007: Dark Reading, Blue Pill Gets a Refill

  57. Bullet03/08/2007: The Inquirer, Graphics drivers are malware compliant

  58. Bullet15/05/2007: ZDNet, Rutkowska launches Invisible Things Labs startup

  59. Bullet15/05/2007: Dark Reading, Invisible Things Comes to Light

  60. Bullet30/04/2007: Computer World, Researcher to demonstrate Vista attacks

  61. Bullet26/04/2007: Dark Reading, Rutkowska Launches Own Startup

The press articles listed below contain reports of various ITL research or interviews with ITL members. Only articles written in english have been selected. The articles are not necessarily 100% technically correct when reporting our research. The readers are always encouraged to read ITL’s original papers and presentations, instead of relying on 3rd party, often sensationalist, reporting.