OpenStack Cloud Vendors Vigilant in the Face of NSA Snooping
The Edward Snowden revelations about NSA snooping in the cloud are not having an impact on OpenStack cloud vendors, including Rackspace and Dreamhost.
The Edward Snowden revelations about NSA snooping in the cloud are not having an impact on OpenStack cloud vendors, including Rackspace and Dreamhost.
The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. The changes forced one site offline and caused problems for the others. Here are three ways such attacks happen, and how they can be mitigated
Areas of blind spots within the typical enterprise are many, including applications, network traffic, network devices and user activity.
I've long been a believer that a judgement gap, influenced largely by negative media coverage, is what continues to hold back cloud adoption among small organizations. And judging from the results of a recent study completed by comScore, my intuition has been fairly on track.
File storage and sharing using consumer-oriented cloud services can be a security problem for companies that want to avoid sensitive data leaks. ownCloud aims to solve the issue by offering commercial cloud services installed within a company's own datacenter.
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims.
Google has been using its own custom version of Linux, Google Compute Engine Linux, as it loads its customers' applications into its infrastructure as a service.
Spammers are using Google's good reputation to dodge mail filters deliver their irritable spew to inboxes across the Internet.
A tiff between a Dutch company and Spamhaus, which blacklists spammers, has turned into a cyber attack of epic proportions. The distributed denial of service attack (DDoS) spread from the Spamhaus website to the rest of the Internet, reportedly affecting millions of rank and file Internet users.
'm going to start with three data points. One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.
It's 2013. but the Linux FUD just keeps coming. In the most recent example, security firm Trustwave claimed that Linux kernel vulnerabilities went unpatched more than twice as long as it took to fix unpatched flaws in Windows. This assertion would be a lot more believable if it wasn't coming from a Microsoft partner.
Secure Sockets Layer/Transport Layer Security is the foundational technology that secures Web transactions and communications, but it is not infallible.
Printers using server software offered by Hewlett-Packard (HP) are reportedly vulnerable to attack. In fact, it's possible for a hacker to use the flaw to bypass security defenses, steal documents, and crash every machine connected to the same network.
If you want to train large groups of students on how to use and deploy networking equipment, you
The Security for Business Innovation Council, comprised of IT security professionals from 19 companies worldwide, called cloud computing the main disruptive force for 2013.
A fool and his feeble p@$$w0rd are soon rooted, but if 2012 has proven anything, it's that even the most cautious security-minded souls need to double down on their protective practices, and think about the best ways to mitigate damage if the worst happens in our increasingly cloud-connected world.
Amazon, the nation's largest online retailer, apparently still has some rather porous security protocols.
Because Web 1.0 is many years behind us, we can all look back and laugh at the sorry state of application and database security in those days. When we look back at Cloud 1.0 in a few more years, we're sure to have another good chuckle.
A whole range of Arcor, Asus and TP-Link routers are vulnerable to being reconfigured remotely without authorisation. On his blog, security researcher Bogdan Calin demonstrates that just displaying an email within the router's own network can have far-reaching consequences: when opened, his specially crafted test email reconfigures the wireless router so that it redirects the user's internet data traffic.
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S.