Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The attacks are carried out by waves of botnet zombies pouring from infected servers across the world and aimed at the United States. The main source of the outbreak is an innocent general interest website based in the UK that has been poisoned by a web
denial of service
Breaking the Mold: Why IT Veterans Can’t Resist the Cloud Like it or not, Cloud Computing has transformed the way we communicate; from online storage to social networking, server virtualization truly pushes the boundaries of what is possible in a digitized world. Yet it was only a few years ago that the cloud was merely being used as a buzzword to describe specific web services hosted on shared web space. So what has changed? Cost, for one thing and availability for another; IT decision makers who once criticized the cloud may soon have to embrace it. The Economics of Cloud
Auto Scaling In Cloud Computing Cloud computing with its dynamic scaling feature which allows one to scale, that is to increase or decrease, the amount of resources depending on the demand has become a great boon for IT professionals everywhere. This is especially true for environments with very unpredictable traffic flow, like the whole internet for instance. With traditional servers that were preconfigured to handle a certain amount of load, a website might go down especially when traffic has suddenly surged to levels above the capacity of the server. This happens when some sort of news or event leads people
How To Tackle Security Vulnerabilities In Hypervisor Based Cloud Servers Virtualization brings numerous security issues apart from the enormous benefits and productivity. Most of the organizations are reluctant to migrate to the cloud just because of the massive security vulnerabilities of cloud computing. Hypervisor, which is used in any virtualization environment to elevate the virtual machine collaboration, can be easily breached if not secured optimally. Hypervisor based cloud servers are always exposed to the Distributed denial-of-service (DDoS) attacks and the “single point of failure” weakness of the hypervisor based cloud servers can easy be exploited to take down the whole
The Other Cloud Issue – Availability – And What You Can Do About It “It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.” – Warren Buffett, legendary investor and one of the richest men in the world. Even as the world moves to the Cloud, concerns remain. While for most stakeholders, its security concerns that keep them awake at night, but for many, the bugbear is availability. While security on the cloud gets a lot of coverage in tech media, and deservedly so, availability, which
Robin Hood Gone Evil: Loophole Leading To Cloud Pickpocketing Identified Researchers at North Carolina State university and University of Oregon have proposed a jaw-dropping price tag for performing heavy duty cloud computing task – as low as zero dollars. Experiments reveal that cloud-based web browsers can be exploited to hijack the underlying computational power, and that as well, in total anonymity. The result could be as unforgivable as cloud computing time theft of mammoth proportions. The pickpocketed resources, once fallen into the wrong hands, can be used for just about anything, including brute force password crack attempts, denial of service attacks and other genres
17 million cyber-attacks blocked between April and June by secure cloud hosting provider London, UK – July 24, 2012 – Secure cloud hosting company, FireHost, has today revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centers in the US and Europe. During the period of April to June 2012, the web applications, databases and websites of FireHost’s customers – spread across 33 countries worldwide – were protected from a total of 17 million cyber attacks, of which more than two million were categorized as the most serious kind of attack, and among FireHost’s ‘Superfecta’.
Akamai Introduces New Cloud Defense Solutions Akamai Technologies, Inc. unveiled new cloud defense architecture aimed at protecting customers from increasing number of sophisticated Web attacks. Enhancements include improved protection from distributed denial of service (DdoS) attacks as well as improved cloud firewall featuring advanced vulnerability scanning and custom rules for additional protection against application layer attacks, the company said in a press release. Companies worldwide incur estimated losses of one trillion dollars a year, according to antivirus company McAfee, and Akamai unveils a new cloud security solution to help global business reduce financial damages from the growing number cyber attacks.