The cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.
Seismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability
The US government recently revealed details of a hack in which up to 4 million records of current and former employees were scooped in a hack. Fingers were pointed at the Chinese who have track record when it comes to this sort of attack. But no one is entirely clean and certainly the US has created its fair share of silent and devastating malware platforms that are still out there. And this sort of thing has actually been going on for years.
Password management company LastPass hacked, but it’s safe; inside the mind of a teenage ransomware creator; Iran is rampant in its cyber-attacks across the Middle East; Israeli hackers break into Foxconn and more devilish doings in the world of cyber space
Stuxnet is being used by North Korea with the aim of destroying cities and killing people. It was used to infiltrate North Korean networks with the intent of destroying physical infrastructure. It has been discovered on the International Space Station. It allegedly wrecked part of a Russian nuclear plant. Is there anything Stuxnet can’t do? We know it tore apart centrifuges at an Iranian uranium enriching plant over five years ago. But is it as lethal and ubiquitous as it’s claimed or has it simply gained mythical status because it was the world’s first cyber weapon?
This infographic gives you the inside track on the scourge that is malware and even explains what botnets are; ranks of hijacked computers that among other things, send out malware. Read more
Fancy a chat with a friend in Lithuania, catch up with the folks back home in Gdansk or check something new in Prague? Webcams are a great tool for communicating long distance, you can see who you’re talking to and gain a whole new dimension to online chats (even if it is slightly convex and everybody appears a bit round around the head). But, sorry to say if it’s on the internet, and webcams truly are, it’s hackable. And webcam hacking is the ultimate invasion of privacy… and there’s the horror.
The internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.
There’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.
BullGuard has released a valuable guide to protecting children online. It’s packed with practical tips, the results of a parents’ survey, further references and simple common sense advice. In a seemingly complex area it’s a beacon of simple and sound advice that will help you keep your kids safe online.