Google News

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

By CloudBuzz | August 10, 2019

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google’s own security research team. There have been multiple headlines about the millions of harmful apps being installed from the Play Store, but this is


Credit card companies forbid bitcoin purchases—with good reason

By CloudBuzz | August 8, 2019

Apple launched a new credit card this week in partnership with Goldman Sachs and Mastercard, offering consumers 2% cash back on purchases made using Apple Pay (the company’s digital wallet service) and 1% on other transactions. There’s also 3% cash back on

John Pientka

Is It Safe? Growing with the Cloud

By John Pientka | August 7, 2019

Oh no! Not again! Another massive data breach: 106 million individuals have their data stolen. This time it is from Capital One. All the data was located on Amazon Web Services cloud computing platform. Is the cloud safe? We were

Tech Crunch

Twitter ‘fesses up to more adtech leaks

By Tech Crunch | August 7, 2019

Twitter  has disclosed more bugs related to how it uses personal data for ad targeting that means it may have shared users data with advertising partners even when a user had expressly told it not to. Back in May the social network disclosed a bug


New advanced malware, possibly nation sponsored, is targeting US utilities

By CloudBuzz | August 2, 2019

A new piece of advanced espionage malware, possibly developed by nation-supported attacker, targeted three US companies in the utilities industry last month, researchers from security firm Proofpoint reported on Thursday. Employees of the three unnamed companies, a Proofpoint reported, received

Intel, Sequretek, Eclypsium and Perception Point Advance Threat Detection Solutions

By Intel | August 1, 2019

What’s New: Next week at Black Hat 2019 in Las Vegas, hardware and firmware security will be a central topic of conference trainings and briefings. Intel and a growing number of companies in the industry continue to advance technologies that improve security at

Louis Columbus

Top 10 Cybersecurity Companies To Watch In 2019

By Louis Columbus | July 31, 2019

Top 10 Cybersecurity Companies To Watch Gartner predicts worldwide spending on information security products and services will reach $124B in 2019, growing 8.7% over the $114B invested in 2018. Cloud Security platform and application sales are projected to grow at a 35.3%

The Right Time To Move To The Cloud

By Steve Prentice | July 30, 2019

Time To Move To The Cloud Ancient cultures all over the world relied on the phases of the moon and the stars in the night sky to time the planting of seeds and harvesting of crops. We have all heard

The Verge

Sites could be liable for helping Facebook secretly track your web browsing, says EU court

By The Verge | July 30, 2019

The European Union’s top court says website owners could face legal risk over Facebook’s ubiquitous “Like” buttons. The Court of Justice of the European Union ruled today that site owners could be held liable for transmitting data to Facebook without


Capital One Says Breach Hit 100 Million Individuals in U.S.

By CloudBuzz | July 30, 2019

Capital One Financial Corp. said data from about 100 million people in the U.S. was illegally accessed after prosecutors accused a Seattle woman identified by Inc. as one of its former cloud service employees of breaking into the bank’s


No More Ransom project has prevented ransomware profits of at least $108 million

By CloudBuzz | July 29, 2019

On the three-year anniversary of the No More Ransom project, Europol announced today that users who downloaded and decrypted files using free tools made available through the No More Ransom portal have prevented ransomware gangs from making profits estimated at


The Terrible Anxiety of Location Sharing Apps

By Wired | July 28, 2019

IT’S 1:30 IN the morning and I’m pretty sure my girlfriend is dead. She went out with friends after work to celebrate somebody’s birthday. I opted to stay in and go to bed at a decent hour because I have work

Facebook and Google Algorithms Are Secret—but Australia Plans to Change That

By CloudBuzz | July 27, 2019

The government is considering limits to big tech’s power over news and advertising markets, and boosts to privacy protections CANBERRA, Australia—Tech giants Facebook Inc. FB -0.48% and Alphabet Inc.GOOG 10.45% ’s Google could have their secretive algorithms policed by a beefed-up watchdog, under what Australia describes as world-first limits

BBC Tech

Marcus Hutchins spared US jail sentence over malware charges

By BBC Tech | July 27, 2019

The British computer hacker who helped stop a major cyber-attack affecting the NHS in 2017 has avoided a jail sentence in the US over malicious hacking charges. In April, 25-year-old Marcus Hutchins pleaded guilty to two charges of making malicious


Chris Hughes, a Facebook Founder, Is Working With the Government to Break It Up

By CloudBuzz | July 26, 2019

Chris Hughes used to huddle with Mark Zuckerberg in a Harvard dorm room building Facebook from scratch. Now, he’s huddling with regulators to explain why Facebook needs to be broken up. In recent weeks, Mr. Hughes has joined two leading

BBC Tech

Ransomware hits Johannesburg electricity supply

By BBC Tech | July 26, 2019

A major electricity supplier in South Africa’s largest city has suffered a ransomware attack, leaving some residents without power. City Power revealed on Thursday that its IT systems had been shut down. “It has encrypted all our databases, applications and

David Discenza

Four Ways to Improve Cybersecurity and Ensure Business Continuity

By David Discenza | July 23, 2019

Four Ways to Improve Cybersecurity Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? You might think that it’s large corporations and, in a

BBC Tech

Lancaster University students’ data stolen by cyber-thieves

By BBC Tech | July 23, 2019

Students’ personal data has been stolen in a “sophisticated and malicious” phishing attack at Lancaster University. Officials said the information had been used to send bogus invoices to applicants. “A very small number” of student records, phone numbers and ID

The Verge

The Verge – Delivery apps like DoorDash are using your tips to pay workers’ wages

By The Verge | July 23, 2019

When you order food through an app and tip the worker who delivers it, you’d be forgiven for thinking that the money you give goes directly to that person. But in reality, some delivery apps use your tip to make

Choosing A Cloud Provider for VMware Workloads

Choosing A Cloud Provider for VMware Workloads? Ask These Questions First

By Steve Prentice | July 22, 2019

VMware Workloads Provider Most of the cloud fanfare we see in today’s media is focused on application development, specifically, the services that cloud providers offer to support development of new applications on their platforms (IaaS). For new companies that are


Vidya Phalke

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a ...
5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

5 Pitfalls to Avoid when Selecting a Cloud-based Video Conferencing System

Video Conferencing System Pitfalls A recent survey revealed that three out of four executives predict that video conferencing will ultimately ...
Where Business Intelligence Is Delivering Value In 2018

Where Business Intelligence Is Delivering Value In 2018

Executive Management, Operations, and Sales are the three primary roles driving Business Intelligence (BI) adoption in 2018. Dashboards, reporting, end-user ...
Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies Public cloud migrations come in different shapes and sizes, but I see three major approaches. Each of ...
Vidya Phalke

How To Be Data Compliant When Using The Cloud

Data compliant Companies using the cloud for data storage, applications hosting or anything else, have to carefully consider data compliance ...