Untitled Document

Cloud computing services under malware threat

by Anees on 2013-08-12 at 23:31:04


It seems malware writers are targeting a new territory: Cloud computing services. According to new research, malware hackers might be attacking cloud services and spreading their malware programs, much more than had been anticipated.

    Michael Sutton; “Attackers are starting to leverage hosting services. It used to be that (attackers) would set up their own servers. Then we saw them infecting legitimate third-parties. Now they are using hosting services. They are no longer paying for hosting (malware) and are less likely to get blacklisted.” — Michael Sutton, vice president of research at ZScaler

With the addition of the smartphone and data mobility markets, cloud services are becoming even more popular. Cloud services provide their users space to host their files and the ability to access their data from anywhere in the world.

According to a report done on cloud computing by Market Research Reports, the whole cloud is not just restricted to file hosting/sharing anymore, but it is in fact evolving into something bigger. Add communications and commerce into it, and what you would see, is something very big indeed. Companies are also using cloud computing to save on their operational costs and to make data sharing more effective within their infrastructure.

Using cloud services is seamless and here are no hassles, all you need is a device with internet access. Cloud services such as Heroku and Windows Azure are leading the market. Cloud computing is also gaining steam among mobile workers. Professionals carry their workplaces wherever their go through devices such as notebooks, smartphones and tablets. Through the use of cloud services they can access their data directly and can manage it on the go.

Malware programs as they apply to cloud technology, are software which tend to infect the whole network once they are activated. They can also create a leak of confidential files which can lead to abuse of information. The use of cloud services, and the lack of internet security can damage the integrity of the network and cause plenty of damage. Malware writers can also set up fake hosting sites, and use that to distribute their malware. IT managers need to be careful when looking for hosting websites or cloud services to avoid such operators.

If an authentic website is on the receiving end of such malware, it can easily pass through the regular corporate internet security programs. It is becoming increasingly important for companies to place a blacklisting system ‘ahead of the cloud’ to avoid such situations.

Photo: Berkeley Lab/Flickr



20
Oct

mDubai: Your complete gateway to Dubai... App launch at Gitex

by Nadeer

Under slogan 'Together for your Happiness' Dubai Smart Government (DSG) to unveil smart app bouquet


Under the slogan ‘Together for your Happiness’, Dubai Smart Government (DSG) is participating with


20
Oct

Finland: Hacker illegally accessed 60,000 servers worldwide and used foreign

by Nadeer

Finland: A hacker has been arrested from Helsinki (capital and largest city of Finland) for a suspect in Illegal accessing of 60,000 servers worldwide.

Along with the servers, hacker


14
Oct

Vulnerability in Whatsapp allows decrypting user messages

by Nadeer

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages.

 Whatsapp, the mobile application for instant messaging platform has


03
Oct

Facebook, Cisco partner to power Wi-Fi check-in at stores

by Nadeer

 Restaurants, hotels, retailers, and public locations will be able to get Wi-Fi equipment from Cisco and a check-in experience from Facebook.

Facebook just "friended" Cisco Systems.

 

The two companies are partnering up


23
Sep

Hack apparently discovered for Apple's iPhone 5s fingerprint sensor, Touch

by Nadeer

A hack has apparently been discovered that acts as a work around for Apple's new fingerprint sensor, Touch ID on the iPhone 5s

A group of hackers, called the Chaos Computer


22
Sep

Oracle preps NetBeans for a mobile Web future

by Nadeer

 Now NetBeans programmers can work on HTML5 code from directly within their Java and PHP projects

Although originally built to develop enterprise Java apps, the NetBeans IDE (integrated development


16
Sep

Taiwan Chip Industry Powers the Tech World, but Struggles for

by Nadeer

 Tien Wu, chief operating officer of Advanced Semiconductor Engineering, has a problem: the brightest young people in Taiwan do not want to work in the island’s signature business, chip making.

“All


11
Sep

7 top changes in Apple's new iOS 7 operating system

by Nadeer

Apple is touting its latest mobile operating system as the "most significant" iOS update since the original iPhone.

"Downloading iOS 7 is like getting an all-new device," said Craig Federighi,


11
Sep

Apple unveils 2 new iPhones including cheaper model

by Nadeer

For the first time since introducing the device that changed cellphones forever, Apple will offer two distinct versions of the latest iPhones — a cheaper one made of


09
Sep

Facebook, Google and Twitter caught monitoring URLs in messages -

by Nizar

Large Internet firms including Facebook, Google and Twitter are monitoring some web links sent between their users, including those in private communications, a research firm has confirmed. Swiss security


08
Sep

How to install Android on your PC

by Nadeer

Windows 8’s bold grab for tablet relevance may snatch headlines, but it isn’t the only operating system looking to extend its established supremacy over a whole new class of devices.


07
Sep

How to solve the 10 most common tech support problems

by Nadeer

 Whether you’re dealing with your dad’s decade-old computer or your own custom-built gaming rig, troubleshooting PC problems is a part of everyday life. Before you make that $50 support call,


05
Sep

6 Benefits of Cloud Computing

by Nadeer

The cloud, cloud computing, SaaS…like it or not, we hear these terms mentioned incessantly in the technology and business world.  And for a good reason – the benefits of


04
Sep

Hackers Find Weaknesses in Car Computer Systems

by Nizar

As cars become more like PCs on wheels, what's to stop a hacker from taking over yours?

In recent demonstrations, hackers have shown they can slam a car's brakes at freeway