Articles

Generational Risk: Millennials & Data Security

Millennials are typically seen as the go-to generation for all things tech-related. So it may come as a big surprise that recent surveys indicate that lax generational views toward data security could jeopardize the safety of your enterprise’s data. This flies in the face of the recent trend of reverse mentoring, in which younger workers […]

NSA Surveillance Taking a Toll on U.S. Cloud Computing Companies

Recently we have examined both the conveniences and concerns regarding cloud services, and the conversation is most likely far from over. National Security Agency surveillance has definitely raised concerns about privacy of user data in cloud services. Documents leaked by Edward Snowden indicate that the NSA has been collecting huge amounts of user data by […]

Cloud Computing and Denial of Service Attacks: Examining the Vulnerability of NTP Servers

Cloud services are becoming increasingly popular these days, both among the public and business enterprises. While convenient, Cloud services can be extremely vulnerable to Denial of Service attacks (DoS). As more organizations are relying on cloud computing technology for their business operations, denial of service attacks, one of the most common forms of attack on […]

Healthcare Data Security: Is Your Cloud Service Provider HIPAA compliant?

With healthcare data doubling every year, it can be extremely difficult for medical institutions to manage such a huge amount of information using traditional IT systems. This is one of the reasons why the healthcare industry is gradually moving towards the use of cloud services.  A cloud storage system allows organizations to place data on […]

How Can Enterprises Ensure Security Against Cloud Security Breaches?

Cloud computing has become the driving force of today’s IT industry. More and more enterprises are moving towards this technology because of its flexibility, cost effectiveness, and easy deployment. According to the technology researchers at Gartner, the cloud services are expected to grow to $210 million by 2016. However, cloud computing is vulnerable to several […]

New Security Technology “Honey Encryption” Deceives Hackers

Security researchers have devised a unique method to trick the hackers trying to crack encrypted information. As you may know, encryption is one of the most effective methods of protecting data. However, it is seen that in many cases intruders are successful in getting into the system by trying different encryption-cracking methods. There are several […]

Wookie Gone Wrong: Tor-Enabled Malware ChewBacca Infects Dozens of Retailers

The Point-of-Sale (PoS) malware attacks seem to be on the rise since last year. Many retailers like Target and Neiman Marcus became victims of such attacks. Recently, the RSA brought into light another PoS malware called “ChewBacca”. In the past three months, this Trojan has stolen credit and debit card information from dozens of retailers. […]

Spying Birds? Angry Birds Website Hacked due to NSA Spying Claims

If you are fond of playing the game Angry Birds like thousands of other people, then you need to be very careful regarding the privacy of your data. The NSA has been exploiting the vulnerabilities in “leaky” smartphone apps, like Angry Birds, to collect sensitive user information. The majority of apps transmit or share a […]

Security Concerns with “The Internet of Things”

The Internet of Things has become an emerging trend in today’s age. As the number of devices connected via Internet grows, the risk of cyber attacks also increases. By connecting so many unsecured smart devices like TVs, refrigerators, etc. to the Internet, we are opening the doors to many malicious activities. Recently, a security research […]

Beware: Malware Distributors are Moving Towards Cloud Computing Services

As has been the trend of businesses, the makers of malware are also moving towards cloud services because of its flexibility, cost effectiveness, and easy maintenance. Malware distributors are embracing cloud services as a method of hosting malicious codes and adware. They are doing so either by buying services directly from the cloud service providers, […]