Talking Cloud Technology is Yesterday’s News The other day I was on the phone with a colleague, discussing market trends of cloud computing. With me in the room was my 55-year old uncle, who heard bits of our conversation. After the call, he asked me why we spent so much time talking about clouds when
Tag: Cloud Security
The IT world is advancing at an astonishing pace. Just a few years ago data was stored physically on databases and software was managed manually. But today more and more organizations are gravitating towards cloud based solutions for their computing needs. While being extremely convenient, cheap and hassle-free, insecure programming can lead to a plethora of vulnerabilities and
Shape Security: Getting Down to the Root of Hacking When treating an illness, it is generally more effective to treat the source of the problem rather than the symptoms. Shape Security is trying to do the same in the field of website security. While all other products are geared towards a faster, cheaper, and better
2013 Threat Predictions This past week, one of the frontrunners in high-performance network security announced their predictions for the top threats of 2013. The following are highlights of the top 3. 1. Advanced Persistent Threats (APTs) – Generally known to target specific classified information by using various methods and vectors, this coming year they are
Hacktivists reach a new level of cyber terror in Israel Since the outbreak of hostilities between Gaza and Israel, several Israeli companies as well as those doing business with them have absorbed quite a few cyber attacks. According to various sources, 44 million attacks have been prevented since rockets began falling.
EU Official hacked at an Internet Security Conference A European Union Official has come out in a statement which declared that her staff was hacked when they attended an internet Security conference last month in Azerbaijan. EC Vice President Neelie Kroes, released a statement about the ironic hack in her blog last week, where she
Securities and Exchanges Commission leaves sensitive data vulnerable to hackers Staff of the Securities and Exchanges Commission (SEC) have left highly sensitive information from exchanges open to hacking and other cyber attacks because they miserably and negligently failed to secure their data and devices to the required standards. This statement came after inside information was leaked to the News Agency
Foreign Hacker Steals 387,000 Credit Card Numbers From South Carolina’s Department of Revenue A foreign hacker has managed to steal nearly 400,000 credit and debit card numbers as well as 3.6 million Social Security numbers from the South Carolina’s Department of Revenue. While most of the stolen credit card details were encrypted, 16,000 had no
Muslim Hacker Group Attack US National weather Service A Hacking group from Kosovo calling themselves the Hackers Security group have released sensitive hacked data from the US National weather service. The stolen information included, files from the web server and other sensitive data that could be used for a later attack.
Microsoft vulnerable to VPN attack Microsoft’s MS-CHAP v2 (Microsoft Challenge Handshake Authentication Protocol version 2) which is used to authenticate users in PPTP-based (Point-to-Point Tunneling Protocol) VPNs has been shown to be vulnerable to hacks according to reports from the recent Defcon conference.