A Reminder From Yahoo: Change (And Improve) Your Passwords

YahooLogo

On January 31, 2014, Yahoo announced that a major theft of mail account passwords had compromised an “ undisclosed number” of accounts. Writing from the Yahoo Tumblr blog, senior vice president in charge of Yahoo’s platforms and personalization products, Jay Rossiter, pointed out the attack was a result of a third-party database being compromised, and not

Enjoy Full Article

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

incapsula

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The

Enjoy Full Article

Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Risk-Security

Breaking the Mold: Why IT Veterans Can’t Resist the Cloud Like it or not, Cloud Computing has transformed the way we communicate; from online storage to social networking, server virtualization truly pushes the boundaries of what is possible in a digitized world. Yet it was only a few years ago that the cloud was merely

Enjoy Full Article

Auto Scaling In Cloud Computing

traffic-flow

Auto Scaling In Cloud Computing Cloud computing with its dynamic scaling feature which allows one to scale, that is to increase or decrease, the amount of resources depending on the demand has become a great boon for IT professionals everywhere. This is especially true for environments with very unpredictable traffic flow, like the whole internet

Enjoy Full Article

How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers

How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers Virtualization brings numerous security issues apart from the enormous benefits and productivity. Most of the organizations are reluctant to migrate to the cloud just because of the massive security vulnerabilities of cloud computing. Hypervisor, which is used in any virtualization environment to elevate the virtual

Enjoy Full Article

The Other Cloud Issue – Availability – And What You Can Do About It

DDos

The Other Cloud Issue – Availability – And What You Can Do About It “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”                 – Warren Buffett, legendary investor and one of the richest men in the world. Even as the

Enjoy Full Article

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified

Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified Researchers at North Carolina State university and University of Oregon have proposed a jaw-dropping price tag for performing heavy duty cloud computing task – as low as zero dollars. Experiments reveal that cloud-based web browsers can be exploited to hijack the underlying computational power, and that as

Enjoy Full Article

Press Release: Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections

17 million cyber-attacks blocked between April and June by secure cloud hosting provider London, UK – July 24, 2012 – Secure cloud hosting company, FireHost, has today revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centers in the US and Europe.  During the period of April to June 2012,

Enjoy Full Article

Akamai Introduces New Cloud Defense Solutions

Akamai Introduces New Cloud Defense Solutions Akamai Technologies, Inc. unveiled new cloud defense architecture aimed at protecting customers from increasing number of sophisticated Web attacks. Enhancements include improved protection from distributed denial of service (DdoS) attacks as well as improved cloud firewall featuring advanced vulnerability scanning and custom rules for additional protection against application layer

Enjoy Full Article

How To Secure Your Cloud Hosting? Part 2

Practically Speaking About Cloud Computing Before getting into the nitty gritty of what we did in our projects for hardening the cloud servers hosted by us, we would like to emphasize the following, so that these can be firmly embedded in the mind set of readers. First, the way cloud computing is attracting attention is

Enjoy Full Article