RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

The Cloud Is Raining Smart Phones

The Cloud Is Raining Smart Phones

I resisted getting my first cell phone for as long as I could, but finally broke down and got one for use while driving- at the time I was living and working in the Seattle area and my family was a six hour drive away in Eastern Oregon. When you are pulling that kind of mileage two or three times a month, you learn that pulling over to find a phone booth is a time killing inconvenience.

Beyond Land Line Replacement

Still, even though my provider was happy to upgrade my phone every couple years, there was no reason to look for anything very fancy. After all, it was just a phone. It was for talking to people with. Oh, I learned to send texts (but not fast enough that my daughter would ever mistake me for somebody cool), but the important function of the mobile phone was its simplest- to call and receive calls when I was away from my land line.

Until the smart phones hit the market. Smart phones are so much more than just devices to talk to one another, smart phones are a direct tap into the Internet. The smart phone is not quite a perfect tool for interfacing with the ‘net, but the concept is improving on a daily basis.

Blurring The Line Between “Real” Computers

For the foreseeable future, the desktop or laptop screen will remain the preferred tool for going on the Internet, but the scales are rapidly turning. There are places where ‘net connectivity using mobile devices is already more common than using “real” computers.

The most significant differences between a “real” computer and a mobile device is the amount of available memory and the size of the interface. These differences are disappearing so rapidly that they are approaching insignificance.

One solution to the storage question is the use of increasingly huge micro-SD cards, indeed this may be the best solution for onboard storage of data dense media. Increasingly, smart phone users are turning to the Cloud for storage and software solutions.

For Ubuntu, Smart Phones are Real Computers

Some developers are answering the difference between between smart phones and “real” computers but embracing the concept that smart phones are real computers. Canonical, the company behind the Linux based Ubuntu operating system envisions a time when workers will not just plug their smart phones into their work computers, the smart phone will essentially power the full sized work computer.

Having a smart phone powering a full sized computer seems a little far-fetched at first. When you consider how much time the typical smart phone user actually spends communicating compared to “other stuff” it begins to make more sense. This is even before counting the time spent flinging cartoon birds through the air at evil pigs.

By Peter Knight

SYNDICATED NEWS SOURCES

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…