http://feedproxy.google.com/~r/Securityweek/~3/2Tm7WgOhKKc/attacker-uses-virtual-machine-hide-malicious-activity