Cloud Security

Cloud Security news, analysis, research, how-to, opinion, and video.

icloud security primary

Hackers launch Apple ID phishing campaign playing on iCloud security worries

Phishing emails masquerade as security alerts from Apple about rogue iTunes purchases, researchers from Symantec said


Encrypted data in the cloud? Be sure to control your own keys

Data encryption in the cloud is an absolute requirement these days. When you talk to your service providers about encryption, be sure to specify that you want to control your own keys.

The Russian-made tool that grabs nude selfies from iCloud accounts

Elcomsoft said it is aware pirated copies of its Phone Password Breaker software are circulating in the underground

Apple iCloud backup quirk could have allowed hackers to access 'deleted' files

iCloud on iOS secretly keeps last three backups, says researcher

icloud

Nude celebrity photos linked to 'very targeted attack' on Apple iCloud credentials

The criminals who posted online nude celebrity photos, including those of Oscar-winner Jennifer Lawrence, stole some of the images in a "very targeted attack" on user credentials for Apple iCloud.

cloud on mobile devices

How to explain the cloud to end users

'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...

Sony says 'high traffic' downs PlayStation, Entertainment networks

The group claiming responsibility also appears to be involved in a bomb threat against an American Airlines flight

pgpencryption primary

How to use OpenPGP to encrypt your email messages and files in the cloud

When online services lack privacy controls, you can roll your own using near military-grade encryption

mobile security

Researchers build security framework for Android

University researchers have modified the Android operating system to let developers plug in enterprise-class security enhancements that would normally require overhauling a mobile device's firmware.

Why the recent court ruling on Gmail matters to you

Email may be coming under different guidance when it comes to warrants and subpoenas as society and the courts address the evolution of technology. Are you prepared to engage in the discussion?

Do security seals on websites matter?

Does a security seal on a website demonstrate a commitment to security?

firewall

The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

It’s been 20 years since Check Point FireWall-1 made firewalls mainstream.

9 cloud analytics

The continuous cloud controls evaluation model

With the growing trend of increasing clouds and increasing complexity of cloud architecture (hybrid, multi-vendor, cloud of clouds), it is imperative to understand and solve the biggest security concerns. Once you evaluate the cloud...

security phishing

Campaign targeting user credentials discovered after five years

Researchers at Cyphort Labs have discovered a campaign that is actively targeting usernames and passwords, and has done so undetected since 2009.

internet gavel keyboard

Takedown of No-IP by Microsoft impacts 1.8M customers

New details have emerged in the aftermath of Microsoft's actions against Vitalwerks - the company that operates No-IP (noip.com). At current count, 1,832,133 customers were impacted by Microsoft's takedown of No-IP, which directly...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

cloud security

Warning signs corporate computers could be talking to cloud-based malware

The recent discovery of command-and-control software sending instructions to malware-infected computers from Dropbox raises the question of how such threats can be discovered.

traffic

Hackers found controlling malware and botnets from the cloud

Along with all that cloud traffic coming into your business may be some malware

cloud security

How to avoid having your cloud-hosted business destroyed by hackers

The demise of Code Spaces, a code-hosting service that had its customer data deleted by extortionists, is an example of the dire consequences from inadequate cloud security.

Load More