Cybercrime

2 Ways To Keep Your Business More Secure

While it may be impossible to remain 100% protected at all times, it is increasingly important that every company is making the most of its security. The growing threat of cybercrime means that alongside the huge number of benefits that the internet offers, it also comes with some substantial risks. It is this reason why it has never been more important that you look at your online security and critically view it regarding its strengths. Identifying your weak security points is the first stage of addressing them, so here are the key ways that you can assess your business security and help to keep your business much more secure. 

Madonna's 'Rebel Heart' Hacker Gets 14 Months for Violating Cloud Server

Grazed from Music Times.  Author: Ryan Book.

Madonna came after her leaker harder than most and now Adi Lederman, the hacker responsible for dropping a significant portion of her Rebel Heart album during late 2014 is now facing a 14-month prison sentence. It took less than a month to track him down, thanks to a joint operation by the FBI and the Israeli Police forces (that's the help you get when you've had eight no. 1 albums). 
 
Lederman was found guilty of computer trespassing, copyright infringement, obstructing investigation and "prohibited secret monitoring." The court documents suggest that the hacker gained access to a cloud computing network and accessed the files of Madonna, manager Guy Oseary and several other affiliates. The investigation also revealed that Lederman had stolen a song from the pop star previously, in 2012, and had sold it rather than leaking it...

Cybercriminals Go Cloudsurfing to Mine Bitcoins

Grazed from NewsBTC.  Author: Editorial Staff.

Technology has come to that point where all businesses are migrating to cloud based services. Everything from emails, websites, file sharing to enterprise level software run on cloud services these days. Therefore, it doesn’t come as a surprise that the cybercriminals are also choosing greener pastures for their business (if you can call it so).

Cloud: The New Home for Cybercriminals

It was found that the number of attacks on cloud services have gradually increased in the past one year and the trend is expected to continue. Alcatel Lucent’s Motive Security Labs define cloud services as those that are dependent on Internet-based server components.  Just like the companies and individuals migrating to cloud services because of its ease of access and cost benefits, even cybercriminals find cloud more lucrative maybe because of the same reasons as others...

Solving Digital Crimes in the Cloud Faces Numerous Challenges

Grazed from GovTech. Author: Jessica Hughes.

Cloud technology can simplify many computing tasks, but solving a digital crime is not one of them. That's why the National Institute of Standards and Technology (NIST) recently issued a draft report that identifies 65 forensic science challenges in the cloud, with the aim of building a roadmap to overcoming them. The report, NIST Cloud Computing Forensic Science Challenges, collects and aggregates the problems and is the result of research from NIST's Cloud Computing Forensic Science Working Group.

The 65 challenges reveal the magnitude of the problem that cloud computing presents, though it's not an exhaustive list, said Martin Herman, senior adviser for forensics and IT at the National Institute of Standards and Technology. "It shows that there is a lot work that needs to be done to overcome these challenges," said Herman, who co-chairs the working group...

DEA canvasses industry for cloud options to store sensitive crime data

Grazed from FierceGovernmentIT. Author: Henry Kenyon.

The Drug Enforcement Administration is planning to make its first tentative steps into the federal cloud computing arena as it seeks a solution to store sensitive crime data. In a request released July 7, the DEA is surveying cloud providers for the most cost-efficient way to shift data to an agency-wide hybrid cloud. One of the major nodes in this proposed cloud architecture will be the DEA's Sterling Park Technology Center, or SPTC.

The agency wants to move its eGIS capability - a Google Earth-based crime information system that uses geospatial mapping data to tag crime and suspect location data - to the cloud. eGIS is currently hosted at SPTC, but the goal is to create a secondary site hosted on a Federal Risk and Authorization Management Program-compliant government community cloud run by an authorized commercial cloud service provider...

Websense examines the cybercrime cloud connection…

Grazed from TechDay.  Author: Editorial Staff.

With cybercriminals increasingly targeting cloud service providers, nows the time to leverage your security expertise and guide your customers, says Gerry Tucker, Websense ANZ country manager.  IDC forecasts cloud computing to be a $107 billion industry globally by 2017.

Yet for many IT leaders, security concerns are the biggest hurdle when it comes to adopting cloud.  Many businesses are happy with the experience they have using cloud services as they value the improved flexibility and manageability of their IT infrastructure, not to mention lower total cost of ownership...

Cloud Buying Behavior In The Post-Snowden Era

Grazed from Forbes. Author: Ben Kepes.

Many cloud vendors predicted that Edward Snowden’s whistle blowing about widespread NSA surveillance would fundamentally change the technology landscape in general, and the cloud computing landscape in particular. The theory went that customers, wary of their most intimate corporate data being perused by US agencies, would flock to non US cloud vendors to give them security over their data.

Non US vendors such as OnApp and GreenQloud, along with regional service providers such as telcos, either publicly or privately had a view of increasing levels of interest in their services as an alternative to AWS, Google, Microsoft MSFT -0.05% and the other global cloud vendors...

CloudLock Launches Selective Encryption System for Cloud Security

Grazed from MorningNews. Author: Fahad Saleem.

Cloud platforms have always been vulnerable to security threats mainly because of their architecture that makes them more like an “Anything-as-a-Service (AaaS) platform. There have been a plethora of researches and professional of the Cloud computing platforms are working restlessly to mine out the cross platform independence within the cloud platform which can ensure stable cloud connection across different platforms.

Among these start-ups and professional entities in the industry, CloudLock has been the most prominent pioneer which has rolled out many products and services for beefing up the security of the Distributed, Cross Platform Cloud structures. It was only a month ago when CloudLock announced that it had raised $16.5 million in Series C funding led by Bessemer Venture Partners, bringing its total funding to $28.2 million. Today, the impeccable Cloud service has launched ‘Selective Cloud Encryption Service’ which will make sure to select and secure the Cloud traffic based on the calculations by the intelligent algorithms meshed at the back end servers...

Can Cloud Computing Effectively Help Prevent Cybercrime?

Grazed from CloudTweaks. Author: Akash Valand.

We stand on the edge of the digital age, where technology moves quickly, and our lives have been transformed by modern computing. Digitization has resulted in a staggering amount of information flowing through cyberspace. Processing that data has led to a revolution in how we store and access information. The idea of the cloud is nothing new. Considered as far back as the 1960s, it was the principle on which the internet was developed. The term “cloud” was coined in the 1990s with the advent of virtual private networks.

Initially used for simplifying business processes, the application of cloud computing quickly gained popularity among scientific and gaming communities as well. Today the cloud has transcended some of its earlier models and is now widely accepted as a secure means of data storage and shared processing power. Its application in science is vastly accelerating research and has been used with particular success in astronomy...