Skip to main content

Cloud Computing Security Risk Is Impossible to Eliminate

The past couple of years have been tough for those defending the security of cloud computing and those trying to establish secure cloud infrastructures for themselves. For the most part, there have been DDOS attacks or defacements designed to embarrass or punish site owners.

However, even considering only websites or services from which hackers actually took over accounts, stole data or money, or planted malware to help steal data or money from others, the list of security failures is long and distinguished: Google, LinkedIn, Twitter, Hotmail, Global Payments (credit-card clearinghouse for Visa, MasterCard and others), Federal Express, Zappos, a host of local bank and police agencies, and the China Software Developer Network (which, all by itself, lost personal information on 6 million users to a single hacker named Zeng).

True, some of those victims offer services with access too restricted and services too limited to be considered "cloud." Except for the potential booty (money, data or notoriety), cloud and non-cloud services look pretty much the same to criminals trying to crack them open.

During 2010, only 4 million user accounts were compromised by hackers; in 2011 hackers penetrated 174 million accounts (thanks, Anonymous), according to the Data Breach Investigations Report published by Verizon in March. If anything, 2012 is going to be even worse, according to anti-virus/security vendor Kaspersky Labs.

All that hackery did generate tons of publicity, plenty of vocal outrage from victims, diluvian volumes of frettage from pundits and solemn warnings from security companies thrilled to find themselves center stage in a drama they've been narrating all but unheard for years.

Despite all that noise, it's odd to realize that the incident with the greatest potential to cause a change in attitude among users and IT is the hack of a single reporter's backup account on Apple's consumer-oriented iCloud storage service.

It wasn't even a cool hack. It barely qualified as social engineering.

Due only to the weak identity verification of Apple and Amazon, Wired reporter Mat Honan suffered what he described as his own digital death and dissolution. Not only did hackers get into his email and iCloud accounts, but they also used the data-sync connections among Honan's all-Apple suite of personal devices to wipe out all his backup data in the cloud. They deleted everything from his MacBook and iPhone, leaving him with no easily recoverable copy of any of his data, most of which was valuable to only him.

"In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted," he explained in a piece for Wired explaining "How Apple and Amazon Security Flaws Led to My Epic Hacking." "Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook."

Details of the attack are telling, but have been left out to annoy the readership into even more outrage at the poor security/customer service of Apple and Amazon. (They're actually in "Anatomy of a Successful Personal Hack," if you haven't read them elsewhere, follow the link to be appalled by them.)

Cloud Computing Security Risk Is Impossible to Eliminate,Cloud Computing ,Security Risk


Popular posts from this blog

Guest Post Available on these sites

Guest Post Available on these sites. At just 100$ [For all Sites] Contact  +91 91318 68158

Online Blogger Training Program

Online Blogger  Training Program 5 Days Basic  Online Blogger  Training Program [Classes Mon To Fri  ]    2021 To    2021  Timing : 5PM to 5:45 PM  Present Online Blogging  Training Program [5 days a week for 1 Week Only ]  Age : 10Years to 35 Years Only Fees : USD $100 or  INR 899  Work From Home [WFH]   Free Blog  for All  Topics  What is a Blog and Blogging Find a Blog Niche.  Write about What You Love  How to Start a Blog  [Step By Step]  10 Places to Promote Your Blog Posts  To apply for this Position Contact Send us Your following Info on WhatsApp  +91 8851365156  +91 9977513452 Dept :   Online Blogger  Training Program 1. Full Name----------------- 2. Date of Birth---------------- 3. City ------------------- 4. Gender --------------    5. Age -------------- 6. Univ / Ins  -------------------- 7. Education : 8. WhatsApp : 9. Fees Rs 799 by GooglePay  9329737330  PayTm 9826037330 Plz Contact  our Corp Team Manbir Kaur   [Aero Engineer]  Director [Business Dev

New Tools to Identify and Protect Against Cloud Computing Problems

New  Tools  to Identify and Protect Against Cloud Computing Problems Overclockers Club This new  tool  is a very light program, taking less than 1% of a CPU's maximum load and using only 16 MB of memory, that monitors system level information for any deviations from the norm. If a virtual machine sees a sudden change in CPU, memory  ... See all stories on this topic » Increased  Internet  access aims at closing rural-urban education gap Global Times This semester, she is teaching at her hometown elementary school with the aid of the  Internet  and multimedia facilities,  tools  she first used only after she had become a college student. Xujiadu Primary School, where she works, is one of the  ... See all stories on this topic » Casual Collaboration Sweetened by Ribose Einnews Portugal The new web platform, , brings together an unmatched collection of  tools , applications and widgets that harness the real-time, social and cloud-based flexibility of today'