The recent release of I2P 2.5.0, an anonymous P2P network that protects against online censorship, surveillance, and monitoring, has brought a slew of improvements and new features that will certainly intrigue security practitioners. This release aim...
Cloud security threats come in all shapes and sizes, so we asked eight experts to weigh in on what they see as the top threat to cloud security. The answers run the gamut, but in all cases, our cloud security panelists believe that these threats can be addressed.
Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend.
The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sites.
In December 2010, a group of nearly 3000 activists under the name "Operation Payback" launched online attacks against PayPal, MasterCard, and Visa, briefly knocking the three financial services' sites offline and preventing consumers from accessing ATMs or online banking services.
Cloud providers that store client data on shared or virtual servers must ensure that private customer information cannot be accessed in the event of a cyber attack or a server being hacked, according to search specialists, Simplexo.
Another Amazon cloud-services outage occurred on Sunday, August 7th in a Dublin, Ireland data center. This one occurred due to a lightning strike that hit a transformer near the Dublin data center. It led to an explosion and fire that knocked out all utility services thereby leading to a total data center outage. Amazon had its only European data center located there.
Google has taken the unprecedented step of warning millions of users whose PCs it believes are infected with fake security software and other malware, the company said yesterday. But some security experts are leery of Google's move.
BLACK BOX CLOUD DEPLOYMENTS are being shunned by firms looking to backup data due to security concerns.
Cloud deployments, which have gained popularity in the past five years through the promise of accessing seemingly unlimited resources conjured up out of thin air, are being shunned for use as redundant storage due to fears about data security.
Outsourcing computer tasks to firms that maintain huge data centers around the world may not be as safe as billed, despite the cloud's potential for cost savings and reducing the hassles of running in-house servers, security experts say.
Turkey responded to the hacking group Anonymous with 32 arrests following attacks on government websites, according to the country's state-run news agency.
Less than 20 percent of organizations using virtualization technology are adopting security tools to work in tandem with the software in order to decrease the risks that are inherent in a virtualized environment. This according to John Burke, Principal Research Analyst with Nemertes Research, who spoke Tuesday at the IT Roadmap Conference and Expo in Boston about the emerging threats posed to mobile and virtual environments.
The update of the Apache HTTP Server (httpd) to version 2.2.18 earlier this month to close a denial of service (DoS) problem appears to have exposed a related DoS vulnerability. The developers have now released httpd 2.2.19 to fix this new problem which has been rated as moderately critical; however, as with the previous DoS vulnerability, it requires that mod_autoindex is enabled in the web server.
When technology manager Lincoln Cannon wants to give his company's employees and business partners controlled access to various internal resources or cloud-based services the company uses, he goes to one cloud-based single sign-on security service to assign access privileges.
The successful use of phishing emails to breach secure organizations like Oak Ridge National Laboratory and EMC's RSA security division is a stark reminder of the serious threat posed by a type of attack that was previously dismissed as low-tech.
The Sony PlayStation network down news for PS3 and Qriocity players is sobering. The network has been down for several days following an "external intrusion" a.k.a. hacker attack. Sadly, the PSN will be down longer while more security is put in place.
Centrify's Tom Cromelin could hardly kept his excitement down (well, he's a marketing guy -- they get excited when the logo gets a new color) when he wanted to tell me about the new release of Centrify Express 2011. To get the full flavor, let me give it to you in his words:
A presentation at this week's LEET '11, a USENIX workshop on large-scale exploit and emergent threats, delves into the inner workings of the underground economy, specifically the rental and operation of spam botnets.
With more than 47 million domain names under management, GoDaddy has a huge DNS infrastructure that it has upgraded to support the emerging Internet security standard known as DNSSEC for DNS Security Extensions.