Cloud Central
54.4K views | +4 today
Follow
Cloud Central
Cloud Systems, Applications and Implications (use Tags in the Filter menu to navigate)
Your new post is loading...
Your new post is loading...
Scooped by Peter Azzopardi
Scoop.it!

Train your users to beat phone scams

Train your users to beat phone scams | Cloud Central | Scoop.it
'Press 1 to hand us the family jewels' works more often than you might think. A little training can stop this sort of social engineering
Peter Azzopardi's insight:

I hear from a lot of readers these days about phone scams. Sometime, it’s the tech support scam, where fake reps tell people that they’re calling on behalf of Microsoft or Apple and have detected a computer virus on their computer. .........

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

The best computer security advice you'll get

The best computer security advice you'll get | Cloud Central | Scoop.it
The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know
Peter Azzopardi's insight:

Forget every past computer security advice you've ever read -- even from me. This is the real deal. Everything else is wasted cycles.

more...
Scooped by Peter Azzopardi
Scoop.it!

Computing Goes to the Cloud. So Does Crime.

Computing Goes to the Cloud. So Does Crime. | Cloud Central | Scoop.it
While public clouds, by their nature, provide opportunities for malicious hackers, the sophistication of the systems and their management allow for new ways to defend against attacks.
Peter Azzopardi's insight:

Hackers may want to be inside clouds for more than just sensitive data, since cloud computing systems are places where supercomputer-quality processing power can be rented.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Scientists develop self-healing virtual machines

Scientists develop self-healing virtual machines | Cloud Central | Scoop.it
University of Utah creates software that kills off malware in the cloud
Peter Azzopardi's insight:

Researchers claim the software not only detects and eradicates never-before-seen viruses and other malware, but also automatically repairs damage caused by them.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

The big one: The makings of a global cyber attack

The big one: The makings of a global cyber attack | Cloud Central | Scoop.it
Surprise -- the underlying technology matters less to an attack's success than basic human determination
Peter Azzopardi's insight:

Since then, far bigger and faster-spreading worms appeared, most notably Michelangelo, Code Red, Melissa, SQL Slammer, ILoveYou, and Blaster.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Security Breaches

INFOGRAPHIC: Security Breaches | Cloud Central | Scoop.it
Cloud security is an ongoing discussion which will continue to be a hot topic in 2014 and beyond... Provided is an excellent infographic published last week on the wsj.com website
Peter Azzopardi's insight:

The point is, using the cloud does not increase the risk of a cyber attack. If criminals want to hack your data, it does not matter where you have hosted this data. Company servers, although monitored  internally will not act as a deterrent to cyber criminals.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: 2013 Cyber Security Intelligence Index

INFOGRAPHIC: 2013 Cyber Security Intelligence Index | Cloud Central | Scoop.it
Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise
Peter Azzopardi's insight:

Good infographic detailing internet attacks. Yet on a positive note, 80% of vulnerabilities are attributed to the human factor and therefore  can be significantly lowered with better education.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Cloud computing: how can companies reduce the security risk?

Cloud computing: how can companies reduce the security risk? | Cloud Central | Scoop.it
Pravin Kothari outlines a three-step approach to help businesses ensure their information remains secure in the cloud
Peter Azzopardi's insight:

Cloud security lies in encryption (like military grade 256-bit AES) but it will only be foolproof once the key to decrypt belongs solely to the entity that owns the data.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: How A Data Breach Happens

INFOGRAPHIC: How A Data Breach Happens | Cloud Central | Scoop.it
Data Breach: Here is an informative infographic reviewing data breaches as well as another one (below) created by the group at: cloudhance.com
Peter Azzopardi's insight:

Some interesting stats here.

 

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Yes, Apple Really Does Have A Serious Problem With Computer Viruses And Malware - Forbes

Yes, Apple Really Does Have A Serious Problem With Computer Viruses And Malware - Forbes | Cloud Central | Scoop.it
As those with memories stretching back a couple of decades will recall the various forms of computer malware, the viruses, trojans and the like, were things that affected Microsoft Windows users.
Peter Azzopardi's insight:

The author is being rather kind IMO. Malware, trojans, adware, all this stuff is there for one reason and one reason alone. Money! In this case via illicit means. And yes MacOS and iOS are certainly worth targetting now.

 

The real difference here is that MS knows Windows has holes, but has a dedicated taskforce to deal and patch ASAP. Apple, OTOH, never had to deal with such a situation and have been caught with their pants down. I think it is a cause for concern but by no means irrepairable.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: The Grinch Who Stole Data | CloudTweaks

INFOGRAPHIC: The Grinch Who Stole Data | CloudTweaks | Cloud Central | Scoop.it
While we are all very happy about the entire cloud data storage concept and feel that it’s a breath of relief from the constant battle against malware, key loggers, PC monitoring software, and whatnot, we tend to forget that there are steps which we need to take to ensure security even after we have shifted all our digital luggage to the cloud…
more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Update Antivirus and Remove Malware on Your Business PCs - in the Cloud | The Cloud Infographic

INFOGRAPHIC: Update Antivirus and Remove Malware on Your Business PCs - in the Cloud | The Cloud Infographic | Cloud Central | Scoop.it
Check out this infographic to learn what IT pros think about cloud-based solutions that can help them manage antivirus and malware removals.
more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

New NSA hack raises the specter of BadBIOS

New NSA hack raises the specter of BadBIOS | Cloud Central | Scoop.it

Is BadBIOS real?

Peter Azzopardi's insight:

Recent revelations of the NSA’s advanced firmware hacking have sent the InterWebs aflutter. The NSA’s firmware hack is a software module capable of reflashing writeable firmware chips. It can also persist during system rebuilds and hide itself in such a way that makes regular antimalware detection very difficult.

more...
No comment yet.
Suggested by Octavia Moal
Scoop.it!

Completely Remove/Uninstall Win32/Ratosto.A

Completely Remove/Uninstall Win32/Ratosto.A | Cloud Central | Scoop.it

Have you seen Win32/Ratosto.A virus before? Do you know this Trojan horse? What can you do if your computer is infected by this threat? What computer troubles will be caused and how to get rid f it? Learn more information about it please read the following article which will give a brief description about this virus.

Peter Azzopardi's insight:

Win32/Ratosto.A is a very harmful and dangerous infection to the computer. It can attack computer randomly in anytime and anywhere without user consent.

 

Guest post: Thanks to @Octavia Moal for the article

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

China has arrested three suspects for spreading Wirelurker iOS malware

China has arrested three suspects for spreading Wirelurker iOS malware | Cloud Central | Scoop.it
Less than two weeks after the bug was first discovered, the Wirelurker iOS malware has already led to three arrests. First discovered by ZDNet, the Beijing Bureau of Public security has announced...
Peter Azzopardi's insight:

Wirelurker was notable as the first malware program able to penetrate the iPhone's strict software controls

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Apple security checks may still miss iWorm malware

Apple security checks may still miss iWorm malware | Cloud Central | Scoop.it
New research says Gatekeeper and XProtect aren't entirely effective in protecting Mac OS X against iWorm malware
Peter Azzopardi's insight:

iWorm, which is a backdoor that can steal data from a computer, infected more than 18,000 machines, according to security company Dr. Web. It does not exploit any vulnerabilities on Mac OS X but instead relies on tricking people to install it.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Dump your passwords! 8 security and identity breakthroughs

Dump your passwords! 8 security and identity breakthroughs | Cloud Central | Scoop.it
From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again
Peter Azzopardi's insight:

One day, passwords will be a thing of the past, and a slew of technologies are being posited as possibilities for a post-password world. ............

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Cross-Platform Malware

INFOGRAPHIC: Cross-Platform Malware | Cloud Central | Scoop.it

There was a time where you could safely assume a portable drive hooked onto to a windows PC wouldn’t be able to transfer some strain of malware to a MAC system

Peter Azzopardi's insight:

Detailed infographic on the state of cross-platform malware.

 

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Cloud computing services under malware threat

Cloud computing services under malware threat | Cloud Central | Scoop.it
Malware hackers are attacking entire cloud computing services. It is more difficult to blacklist them now, as they operate from within their own networks.
Peter Azzopardi's insight:

I think it is natural to expect that Cloud Service providers would attract the attention of criminal underworld. So now it is a matter of how secure their service is.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: How Umbrella Security Labs Delivers Advanced Malware Protection

INFOGRAPHIC: How Umbrella Security Labs Delivers Advanced Malware Protection | Cloud Central | Scoop.it
A behind-the-scenes look at how Big Data and data mining techniques are driving advanced Umbrella malware protection.
Peter Azzopardi's insight:

Interesting Infographic how Umbrella Security Labs deals with the threat of Malware.

more...
No comment yet.
Scooped by Peter Azzopardi
Scoop.it!

Security will get worse before it gets better

Security will get worse before it gets better | Cloud Central | Scoop.it
The damage caused by threats and the number of Net-dependent critical systems are on the rise. Yet we still haven't created a safer Internet
Peter Azzopardi's insight:

Although there is room for improvement the internet will never be anything even remotely close to 100% secure. So long as there is money to be made via  fraudulent ways it will always attract the wrong crowd. Best we can do is be vigilant.

more...
Cam Ward's curator insight, March 21, 2013 5:18 AM

This blog post makes the interesting point that as more and more essential infrastructure is migrated online the potential fallout from a malicious attack is increasing to the stage where even essential services like electricity, water, and transportation are all exposed to potential attacks.

Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: : Data Breach Review | CloudTweaks

INFOGRAPHIC: : Data Breach Review | CloudTweaks | Cloud Central | Scoop.it
more...
Farid Mheir's curator insight, January 18, 2013 10:21 AM

Security remains at the center of concerns when companies go digital. Of course, going digital incresases the surface of attack and the probability of exposing private information to the general public. However, risks must be weighed against the benefits that digital brings.

Scooped by Peter Azzopardi
Scoop.it!

INFOGRAPHIC: Safeguarding the Internet | Between the Dots | Verisign

INFOGRAPHIC: Safeguarding the Internet | Between the Dots | Verisign | Cloud Central | Scoop.it
Verisign Security covers the landscape of network security. Columnists give helpful tips and best practices for securing and protecting your network.
more...
No comment yet.