Cloud Security

Cloud security news, trends, analysis and practical advice

Miramax
Cloud computing security lock.

Wikimedia (CC)

US asks CHINA to help stop North Korean BIG HACK attacks

Firm in the belief that only one communist regime is permitted to hack into American computers at any given time -- the US government is seeking help. According to recent reports, China's communist government was asked by the US to...

top 5
external url

Now on CIO: 5 Infosec trends that will dominate 2015

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these five trends.

Cloud computing security lock.

More than 30 vulnerabilities found in Google App Engine

There are serious vulnerabilities in Google App Engine, a cloud service for developing and hosting Web applications, a team of security researchers has found.

cloud computing disaster2 100358760 primary.idge

IT needs to stop pretending it's not responsible for cloud security

While IT has ignored the public cloud users have turned Shadow IT into the real thing;when does caution about security become fear of change?

TRUSTe deceived consumers about its recertification program

TRUSTe, the provider of privacy certifications for online businesses failed to conduct annual recertification checks for hundreds of companies holding its privacy seal.

Cloud computing security lock.

Sophos bets on the cloud to fight cyberattacks

Sophos is betting entirely on the cloud in a bid to make it easier for understaffed IT departments to manage cyberattacks

public cloud

Box updates storage app with iOS 8 widget and more

Box upgraded its storage app on Apple iOS and the web with new features to make it easier for users to access their cloud stuff.

Cloud computing security lock.

IBM takes on enterprise cloud security

IBM's new Dynamic Cloud Security offers a set of services covering access control, data protection and increased visibility

PiƱata de Internet Explorer

Apple: Internet Explorer? Never heard of it

Apple on Tuesday told browser users to pay attention to warnings of insecure digital certificates after reports of a "man-in-the-middle" attack against iCloud.com in China was revealed earlier in the week.

iCloud hacked by Chinese

iCloud's man-in-the-middle is from China -- and might work for the gub'mint

Certain folks in China may be used to hearing someone breathing when they pick up their phones (party line?), but new reports suggest Apple's iCloud service is susceptible to the same level of protection by Chinese authorities. It's...

Binary data cloud.

China attacks push Apple to warn users of iCloud threats

Apple warned users about attacks on its iCloud website, after monitoring groups said China tried to intercept customer information from the service.

dropbox phishing

Dropbox used for convincing phishing attack

Dropbox's file storage service was used for a tricky phishing attack, although the service was quick to shut down it down, according to Symantec.

anonabox inline21

Kickstarter suspends Anonabox Tor router project

After days of critical scrutiny on social media networks, the wireless router that was supposedly a custom-built Tor privacy engine has been suspended by Kickstarter after raising nearly $600,000 in only a few days.

security image

Snapchat and other online services need to tighten security

Regardless of the fact that some data leaks weren't the result of direct server hacks, Internet service companies need to do a better job of educating their users and offering stronger security measures.

Dropbox

Dropbox dismisses claims of hack affecting 7M accounts

Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked.

snapchat

The only guide to Snapchat hack you ever need to read

The Snappening: gigabytes of naked selfies. Sky falling: Film at 11. The cloud service denies it's to blame, fingering an unauthorized 3rd-party service. However, Snapchat doesn't get off scot-free: Some say its security is as weak as...

nytimes.scam.leftsideblocked.620w

Fallout from the JPMorgan Chase breach

What's the fallout from the Chase bank breach? Phishing of course, but phone calls and snail mail can also be abused. I was targeted by a snail mail billing scam. Most website rating systems fail to warn about the site involved in the...

Microsoft cloud

Microsoft researchers create a secure haven in the cloud

Microsoft researchers have figured out how to keep data and applications secure in the cloud -- by cordoning them off in memory from the underlying infrastructure.

Load More