Category Archives: Security

Spying Deep Within Hard Drives

Spying Deep Within Hard Drives

Spying Deep Within Hard Drives The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives. Read Full…

Security: Taking The Enterprise By Surprise

Security: Taking The Enterprise By Surprise

Security: Taking The Enterprise By Surprise There has been a great deal of discussion surrounding the news of Microsoft phishing emails delivering malware that dodges sandboxes to enterprise users. This is another example of how often the newer forms of detection/prevention security tools (virtual execution) are not effective. Kowsik Guruswamy, CTO for Menlo Security, who…

The Cyberstates 2015 Report

The Cyberstates 2015 Report

The Cyberstates 2015 Report Growth was led by the IT services sector which added 63,300 jobs between 2013 and 2014 and the R&D, testing, and engineering services sector that added 50,700 jobs. “The U.S. tech industry continues to make significant contributions to our economy,” said Todd Thibodeaux, president and CEO, CompTIA. “The tech industry accounts for…

Is Data Protection Holding Back European Businesses

Is Data Protection Holding Back European Businesses

Is Data Protection Holding Back European Businesses from Adopting the Cloud? Why are companies within the European Union yet to warm to the Cloud? Businesses within the EU are not adopting cloud-based systems as quickly as expected. Do data protection laws and restrictions play a role in Europe’s slow uptake? Despite the fact that cloud…

Samsung Smart TV – Who Is Watching Who?

Samsung Smart TV – Who Is Watching Who?

Samsung Smart TV Smart TV voice recognition software could transmit ‘personal or other sensitive information’ to a third party, Samsung’s policy warns Users of Samsung’s Smart TV devices have raised concerns over the device’s privacy policy, which seems to suggest that they should not discuss any sensitive topics in their living room while the television…

Hackers And New Automobiles

Hackers And New Automobiles

Hackers And New Automobiles Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to a senator. “Drivers have come to rely on these new…

Cloud Infographic – Capitalizing On Convergence In Your City

Cloud Infographic – Capitalizing On Convergence In Your City

Capitalizing On Convergence In Your City Plan for the Future “Cloud implementations must address immediate needs but a successful cloud strategy must be flexible enough to respond to rapidly changing business conditions. By 2020, there will be more than 50 billion devices and objects connected through the Internet of Things and the Internet of Everything…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising