Cloud Central
Follow
Find tag "Hackers"
42.3K views | +140 today
Cloud Central
Cloud Systems, Applications and Implications (use Tags in the Filter menu to navigate)
Your new post is loading...
Your new post is loading...
Suggested by Kundan Bhardwaj
Scoop.it!

Most Common Passwords list - May be Yours is one of them

Most Common Passwords list - May be Yours is one of them | Cloud Central | Scoop.it
1000 Most Common Passwords list - Never use them,Most Common passwords is a threat to security,avoid using top worst passwords from this collection
Peter Azzopardi's insight:

Once hackers know your login id they will start using the passwords from the list. It is a good idea if your password is not on this list.

 

Thanks to @Kundan Bhardwaj for the article.

more...
Roger Smith's curator insight, November 17, 10:07 PM

Passwords - is yours on this list, if it is change it ASAP

Scooped by Peter Azzopardi
Scoop.it!

The big one: The makings of a global cyber attack

The big one: The makings of a global cyber attack | Cloud Central | Scoop.it
Surprise -- the underlying technology matters less to an attack's success than basic human determination
Peter Azzopardi's insight:

Since then, far bigger and faster-spreading worms appeared, most notably Michelangelo, Code Red, Melissa, SQL Slammer, ILoveYou, and Blaster.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC History Of Computer Threats

INFOGRAPHIC History Of Computer Threats | Cloud Central | Scoop.it

A fast-fact look at The History of Computer Security Threats. Security threats are constant, in many cases extremely calculated and inevitably unforgiving.

Peter Azzopardi's insight:

Infographic courtesy of Dell

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

5 Million Gmail Passwords Leak, Google Says No Compromise

5 Million Gmail Passwords Leak, Google Says No Compromise | Cloud Central | Scoop.it
Approximately 4.93 million Gmail usernames and passwords were published to a Russian Bitcoin forum on Tuesday, as first reported by Russian website CNews. That’s the bad news. The good news... Keep reading →
Peter Azzopardi's insight:

If you want to check whether your account is included in the leak, you can head to isleaked.com

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Why you don't need long, complex passwords

Why you don't need long, complex passwords | Cloud Central | Scoop.it
These days, hackers steal passwords wholesale, not one by one, which is why you can ignore outdated password practices
Peter Azzopardi's insight:

These days, most cases of password theft occur in one of two ways: phishing or credential database compromise. P..............

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

A Two-Step Plan to Stop Hackers

A Two-Step Plan to Stop Hackers | Cloud Central | Scoop.it
You may not be able to keep your digital credentials from being stolen, but there are options for keeping a cyberthief from using them successfully.
Peter Azzopardi's insight:

But the developments pushed me in a third direction: To seek out all of the crucial accounts in my life, including every financial one, and try to add another level of security to the login process for each one. Sadly, not many of the companies involved were able to do it.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

The dark art of cloud computing

The dark art of cloud computing | Cloud Central | Scoop.it
No IT system is ever 100 per cent secure, according to 'Black Dragon', an ex-hacker who reveals the dark side of the web.
Peter Azzopardi's insight:

He warned delegates: 'Don’t be fooled by someone telling you your data is secure. If you are accessing the system wirelessly, it is never secure.'

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

IoT, cloud computing, nation-state threats redefining enterprise security, panelists say

IoT, cloud computing, nation-state threats redefining enterprise security, panelists say | Cloud Central | Scoop.it
Companies need to worry about securing hardware that's connected to the Web as well as Windows, said one speaker
Peter Azzopardi's insight:

New threats are coming from nation states that include cyberattacks as part of their defense plans. In some instance, these countries are funding attackers and using them as “cybermercenaries,” he said.

 

Image courtesy cloudcms.com

more...
Azka Devara's curator insight, May 23, 8:15 AM

With more devices connected to the Internet, security issue cannot be neglected. It is now easier for the attacker to commit attack, just by exploiting the weakness in the network. IoT might increase system vulnerabilities significantly, and it could fasten the spread of an attack since now everything is connected on a single network. Enterprise should consider the implication of using IoT to their security, it is important to get a balance of high rate of sharing data using IoT and doing it securely.

Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Security Breaches

INFOGRAPHIC: Security Breaches | Cloud Central | Scoop.it
Cloud security is an ongoing discussion which will continue to be a hot topic in 2014 and beyond... Provided is an excellent infographic published last week on the wsj.com website
Peter Azzopardi's insight:

The point is, using the cloud does not increase the risk of a cyber attack. If criminals want to hack your data, it does not matter where you have hosted this data. Company servers, although monitored  internally will not act as a deterrent to cyber criminals.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Hackers follow business shift to cloud computing - ABC News (Australian Broadcasting Corporation)

Hackers follow business shift to cloud computing - ABC News (Australian Broadcasting Corporation) | Cloud Central | Scoop.it
Security experts warn cloud computing in Australia is becoming an increasingly appealing target for hackers as businesses rapidly take up the technology.
Peter Azzopardi's insight:

This was always to be expected. Hackers always follow the money trail. Now it is a matter of how well security can be beefed up to give a reasonable amount of protection. When this is tried and tested the Cloud will become the norm.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Hacker Lexicon: What Is Homomorphic Encryption?

Hacker Lexicon: What Is Homomorphic Encryption? | Cloud Central | Scoop.it

The problem with encrypting data is that sooner or later, you have to decrypt it. Keep your cloud files cryptographically scrambled using a secret key that only you possess, and it’s likely no hacker will have the codebreaking resources necessary to crack them. But as soon as you want to actually do something with those files—anything from editing a word document or querying a database of financial data—you have to unlock the data and leave it vulnerable.

Peter Azzopardi's insight:

A homomorphic encryption scheme is a crypto system that allows computations to be performed on data without decrypting it.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Losing The Cyberwar To Hackers

INFOGRAPHIC: Losing The Cyberwar To Hackers | Cloud Central | Scoop.it
Much of the discussion lately has been around the JP Morgan security breach. There are also growing concerns that other companies may have been infiltrated as well which is not a surprise considering the ruthless nature of cyberwar. Security will always be an issue and something businesses must continuously prepare for in order to minimize damage.
Peter Azzopardi's insight:

The infographic IDG takes a close look at Cyberwar in the U.S

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Dump your passwords! 8 security and identity breakthroughs

Dump your passwords! 8 security and identity breakthroughs | Cloud Central | Scoop.it
From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again
Peter Azzopardi's insight:

One day, passwords will be a thing of the past, and a slew of technologies are being posited as possibilities for a post-password world. ............

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Not Everything Is Locked Up Within A Secured Network

INFOGRAPHIC: Not Everything Is Locked Up Within A Secured Network | Cloud Central | Scoop.it
Secured Network - Cloud Infographic: Devices That Are Surprisingly Easy To Hack
Peter Azzopardi's insight:

Here is an infographic provided by the group at: http://www.whoishostingthis.com that lists 14 systems that were accessed by hackers through the Internet. Surprisingly enough, in a large number of cases, the hacked passwords and logins were something like “admin”, “password” or “123”:

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

How cloud computing leaked private celebrity photos

How cloud computing leaked private celebrity photos | Cloud Central | Scoop.it
Analysis: Was phishing or brute force responsible for the attack?
Peter Azzopardi's insight:

Following the leak Apple quietly issued a security patch to protect its iCloud users from brute force attacks based on a Python script posted on GitHub, a public code repository, that seemingly avoided security features blocking multiple failed login attempts to the company's Find My iPhone service.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Russian Gang Amasses Over a Billion Internet Passwords

Russian Gang Amasses Over a Billion Internet Passwords | Cloud Central | Scoop.it
The hacked records, discovered by a Milwaukee-based security firm, include username and password combinations and more than 500 million email addresses.
Peter Azzopardi's insight:

This is huge! Scarey!

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Is Cloud Based Anti-Virus An Effective Means Of Security?

Is Cloud Based Anti-Virus An Effective Means Of Security? | Cloud Central | Scoop.it

Is Cloud Based Anti-Virus an Effective Means of Security? - Anti-virus systems are now a de facto part of modern computing. In a world where every webpage, email and downloaded file has the potential to contain malicious code or trojan horses there is a need to be more vigilant than ever about the security of your computer and your data.

Peter Azzopardi's insight:

Cloud-based anti-virus typically uses lightweight software which runs on your compute while offloading the majority of data analysis to the provider’s infrastructure.

more...
Jim Doyle's curator insight, May 27, 8:49 PM
Is Cloud Based Anti-Virus An Effective Means Of Security?
Scooped by Peter Azzopardi
Scoop.it!

Dropbox works to resolve service hiccups, says files are safe

Dropbox works to resolve service hiccups, says files are safe | Cloud Central | Scoop.it
Dropbox said Sunday it was making progress in restoring service after the popular file storage service went offline on Friday.
Peter Azzopardi's insight:

Dropbox dismissed claims on Friday that it had been hacked and attributed the problems to "routine internal maintenance."

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Cybercrime - Are you a Hacker's Target?

INFOGRAPHIC: Cybercrime - Are you a Hacker's Target? | Cloud Central | Scoop.it
To close out this weeks coverage on Cloud security and Cybercrime, we've opted to include an older infographic which sums up this week nicely entitled: "Are You A Hacker's Target?"
Peter Azzopardi's insight:

In this internet age it pays to be aware of what there is lurking in the "shadows".

 

more...
No comment yet.