Skip to main content

cloud

Stratsec critical of cloud security - calls it a potential haven for botnets

posted onOctober 31, 2012
by l33tdawg

Hosting network services on Cloud platforms is getting more and more popular. It is not in the scope of this article to elaborate the advantage of using Cloud computing, instead, as the title of might have already inspired you, here we discuss the potential benefits available to malicious entities in using a Cloud platform (CP). In particular, we are going to see:

Apple quietly bumping iCloud storage to 25 GB until the year 2050?

posted onOctober 1, 2012
by l33tdawg

 Twitter user @mgleet tipped me off that Apple appears to have bumped his iCloud storage plan to 25 GBs until the year 2050. Multiple people here at TUAW are seeing the same plan bumps, though none of us has upgraded our plans, not to mention paid 38 years in advance.

Apple has been known to offer cloud storage upgrades for free in the past when their online services didn't live up to expectations (MobileMe). Could this be a way Apple is apologizing for the Maps debacle?

Cloudnymous launches cloud-based privacy cloak

posted onSeptember 10, 2012
by l33tdawg

As customer data is spread evenly across the cloud, even if a server is brought down, customer data cannot easily be retrieved.

The company is a new player to the tech field, launching earlier this year. The cloud-based VPN service offers "true" anonymity and protection of the user's data through strong encryption protocols, according to the firm -- and may be of particular interest to those trying to circumvent location-based restrictions online.

10 Ways to Ease Public Cloud Security Concerns

posted onAugust 14, 2012
by l33tdawg

Is the public cloud secure enough for mission-critical applications? That's the persistent question that IT departments struggle to answer.

For OpSource—not to mention Amazon Web Services (AWS), Rackspace, Terremark and others—the answer is a layer 2 virtual LAN. In OpSource's case, customers connect to the cloud using VPN clients or site-to-site VPN terminations. This makes the public cloud an extension of the private cloud, making it a secure, hybrid cloud.

Cloud security: Is there any such thing?

posted onAugust 9, 2012
by l33tdawg

Like it or not, technology is becoming ever more reliant on the cloud, and that has both positive and negative ramifications. On the positive side, cloud computing has opened up a whole new world of productivity that didn’t fully exist before services like Google Docs and Office 365 came into view. On a more personal scale, the cloud flipped the entertainment industry on its head with online music lockers that make it possible to access playlists and rock out to your ZZ Top albums wherever there’s an internet connection.

Secure your digital self: auditing your cloud identity

posted onAugust 6, 2012
by l33tdawg

We put more and more of ourselves in the cloud every day. E-mail, device settings, data synchronization between devices, and access to much of our digital selves is tied to a handful of cloud service accounts with Google, Apple, Microsoft, Dropbox, and others. As demonstrated dramatically over the last week, those accounts are easily put at risk if they’re too interconnected—especially since the weakest link in cloud security may be the employees of the providers themselves.

Dangerous assumptions about clouds

posted onAugust 1, 2012
by l33tdawg

No one is more vigilant about protecting the data of EU citizens than European Commission Vice-President Viviane Reding. She is spearheading and vigorously advocating for the Commission's proposals to update and modernize the privacy framework in Europe through a detailed new Regulation. She worries a lot about the privacy and security of EU citizens' data. And she can be a tough critic of the US privacy protection framework.