Cloud computing is loosely defined as the technology revolution that has allowed both computing power and storage to be delivered as a service, using Internet-hosted resources. It is one of the most important technological developments of the last half century – as important as the development of the Internet, without which it couldn’t exist. Today, cloud based computing resources power everything from Google’s search engine, to Facebook to online banking, flight reservation and distance learning systems.
Consumer devices are increasingly coming out of the box Internet-ready, and while a washing machine with its own IP address may be convenient to some and overkill to others, the reality is that this trend is more likely to boom than bust in the coming months and years. The other reality s that the tinkerers out there are going to tinker away with these things, finding new and interesting techniques to leverage their Internet connectivity and computing ability, and eventually, perhaps inevitably, there will be exploits. As the saying goes, that Internet-connected dryer is all fun and games until someone hacks into it and ruins your delicates.
Eric Jackson recently wrote an op-ed in Forbes where he argued that Web 2.0 companies like Facebook may fade into obscurity like the Web 1.0 companies before them as we evolve out of the World Wide Web entirely. He argues that there will be no Web 3.0, that the Web is dying and the mobile space is its natural and inevitable successor. Whether or not the Googles and Facebooks will fade as mobile devices increasingly become the primary tools on which we access the Internet is debatable. However, the fact that mobile devices are rapidly replacing the traditional desktop computer is beyond dispute.
Likewise, as consumers migrate to mobile devices, so go the cybercriminals and security industry as well, and as a recent study found, the adoption of mobile devices seems to be outpacing our ability to secure those devices.
The scarcity of Mac-based malware has reinforced the misconception in some circles that Apple’s machines are somehow invulnerable to the traditional Windows-style of malware infection. This has been a contentious issue in the security industry for the better part of the last decade, but to say that Apple has been malware-free would be untrue. The Mac platform has been dealing with small and somewhat insignificant malicious programs since the early 80’s, which you can read all about in our latest slideshow. For years though, experts have predicted an end to Apple’s relative security cake walk. Stay current and informed on Mac Malware, download this Spotlight today.
The line between our physical and digital lives is becoming increasingly obscure as we upload more and more of our personal and professional information onto the Internet. The concept of a reasonable expectation of privacy is changing dramatically and the places where that expectation once existed are disappearing, compelling some to argue that term “online privacy” has become an oxymoron. Download today.
Whether you’re selling software, running for president, or building a botnet to push phony-pharmaceuticals, social networks are enormously valuable and dynamic tools for getting your message out. Enterprises, as well as their employees, have realized this, and have joined the crush to stake out a place to promote their brands, services and products on the most successful social networks. Unfortunately, many of the very elements that make these networks invaluable tools for publishing, marketing, customer interaction and public relations also make social networks powerful and irresistible markets for cybercriminals. What do you need to know about the security implications of social networks? This Threatpost Spotlight will tell you.
Most of us continue to buy our goods the old fashioned way: using credit cards (or cash) at traditional point of sale terminals, or (increasingly) online. But just off the radar, a whole new world of mobile technologies is ramping up for the purpose of replacing your credit cards – indeed: your whole wallet – with sleek mobile applications stored on a device that’s already indispensible: your phone.
As with any headlong rush into a new technology, however, there are questions being raised about the security implications of mobile payments in all its forms, and concerns that feature adoption is outstripping security on many new payments platforms. Europe) to make purchases with their phones and mobile. It’s still very in the game but, as Threatpost has discovered, there’s already good evidence that warnings about security holes in mobile payments platforms aren’t unwarranted.
Download our Spotlight Series to find out what you need to know about mobile payments.
The Stop Online Piracy Act (SOPA) is a controversial bill introduced by U.S. Representative Lamar Smith (R-TX) to the House of Representatives. Its stated purpose is, “To promote prosperity, creativity, entrepreneurship, and innovation by combating the theft of U.S. property, and for other purposes.” While attempts at reigning in digital piracy receive wide-spread support from the American public, the methods of doing so that SOPA would establish are concerning to many. Download this Spotlight to understand what SOPA is and why it matters.
As the year draws to a close, we’ve compiled our list of the Top Security Stories of 2011, presented here in no particular order. These are the issues that shook the world’smarkets and kept us awake at night. If there’s a lesson here, it’s that cybersecurity challenges aren’t going away anytime soon. In fact, as we look forward to 2012, about the only thing that could quell the continuing battle to secure technology system is if the Mayans turn out to be right. And none of us is rooting for that.
What will 2012 bring? We can’t know for sure. Recent years have taught us that, when it comes to computer security, one should expect to be surprised. However, it’s equally true that in the realm of computer security, “what’s past is prologue,” as Shakespeare famously wrote. In other words: the events of he past year have helped to set the stage for the big events (and news stories) of 2012. What are those likely to be? Download to learn Threatpost’s predictions ofof 2012 security trends.
Blaring headlines that decry insider attacks against their employers are nothing new. In fact, some of the biggest and most damaging data breaches in recent memory were ultimately linked back to rogue employees of large firms. You could be forgiven for thinking that malicious insiders were a threat felt mostly by enterprises and large enterprises. After all, the Threatpost list of Infamous Insiders features no shortage of Fortune 500 firms. But if you assumed that rogue and malicious insiders were an enterprise problem only, you’d be dead wrong. Small businesses, too, are frequent victims of insider attacks and other forms of data theft, and are just as likely to be attacked as large, well-known firms. This Spotlight offers some guidelines that businesses can use to help avoid being a victim.
Security and privacy experts have been warning about the fundamental flaws in the certificate authority system for more than 15 years now, but for the most part those warnings have gone unheeded. The system is set up so that any CA has the ability to issue a certificate for any site on the Web, and users have virtually no visibility into the process and no sense of which CAs are trustworthy. Download this Spotlight to learn more about certificate authority compromises.
For most of the last two decades, industrial and manufacturing firms have lived in something of a security bubble. As enterprise networks struggled to stay on top of denial of service attacks and malicious outbreaks, manufacturers, utilities and others that rely on industrial control software comforted themselves that, when it came to attacks on industrial firms, things were different. Download this Spotlight to learn key facts about threats in industrial manufacturing.
If Firewalls, antivirus software and intrusion detection tools keep out stealthy attackers, how does a company square off against rogue insiders?
That’s a pressing question and one that’s garnering more attention as the number of high profile insider attacks mounts, and as government and private sector regulators take steps to clamp down on malicious insiders.
To help you understand the insider threat better, Threatpost has put together this Spotlight on insider threat attacks that can help you begin to tailor your protections and policies to stop malicious insiders
A Threatpost survey reveals the emerging threat of attack from trusted employees and the inconsistent ways companies are fighting back. Modern businesses thrive on increased collaboration and information sharing. As a result, today’s enterprises are granting employees of all levels access to a growing number of network resources, enterprise applications and other sensitive IT assets as a way to promote greater worker efficiency and improved business performance. But there’s a downside . . . . download Threatpost’s Insider Threats Survey to see the ways attacks from within are vexing the enterprise and where IT security efforts need to be improved.