Archive for the ‘Cloud Computing Security’ Category

Don’t Let Usability Issues Compromise Security

Anyone who has worked in an office environment as probably received an email or alert notifying staff that it’s time to change their login passwords (again) — and that those passwords have to meet an ever growing list of criteria: Letters, numbers, symbols, at least 8 characters, a Klingon word and their great-grandmother’s favorite color. [...]

Share

Google Chrome OS: Too secure to need security?

A leading security researcher has warned that Google risks repeating Apple’s mistakes on security with its new Chrome OS. Google Chrome OS is a Linux-based operating system designed to work exclusively with web applications. Chrome netbooks running the new OS will be available from Google’s partners Samsung and Acer from June. In a launch announcement, [...]

Share

GFI MAX MailArchive Flexible Secure Solution

GFI Software has released GFI MAX MailArchive, an external service that allows business to archive email messages in a geographically distributed data centers for the possibility to follow prepare and search content. Platform-service can be used either independently or as an integrated service with GFI MAX MailProtection to provide comprehensive spam and virus protection, always [...]

Share

Tarantino-style Secure Cloud Computing

Chemtrails, Vegas, Roulette and the IRS By Rick Lawhorn CISSP, CISA, CHP, CHSS No matter if you believe in conspiratorial chemtrails or scientifically sound contrails, the ability to see where you have been and guess which direction you are potentially heading is paramount to data security in the clouds. Of course, data flying around the [...]

Share

Quick Tips on Secure Shell

SSH is a perfect security alternative to Telnet and has been used by system administrators and IT managers to configure and implement servers and network devices, here I wanted to list manual on Secure Shell usage. First let’s start by choosing SSH client here we will find no problem because generally there are two accepted [...]

Share

Malware is Hiding in Amazon Cloud

Cybercriminals have made this week unforgettable for Amazon team this is after that security researchers have reported existing of Zeus Botnet at The cloud-based EC2 (Elastic Compute Cloud) control center. The incident has been detected after a Password-stealing Zeus banking Trojan had infected client computers where hackers were able to compromise a site on EC2 [...]

Share

Attack Hitting Virtual Private Networks & How to Protect Yourself

Virtual private network (VPN) software from Cisco, Juniper and other multiple vendors are concerned for a new vulnerability that makes a big number of customers at Risk this is according to a Monday report issued by US-CERT. Clientless SSL VPN is used to provide internal network access over web browser to several resources such as [...]

Share