TITLE

Application attacks against clouds up 45%

AUTHOR(S)
Korolov, Maria
PUB. DATE
October 2015
SOURCE
Asia Cloud Forum;10/14/2015, p3
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports the increase in application attacks on Cloud computing security, discussing threat to companies and consumers submitting confidential data on Cloud storage system.
ACCESSION #
110352280

 

Related Articles

  • Cloud-Based Storage Services Used to Store Malware.  // Bank Security Report;Jan2011, Vol. 40 Issue 1, p4 

    The article discusses a warning issued by Kapersky Lab security experts that spammers are utilizing cloud-based storage services to store malware.

  • IBM cautions of mobile, cloud security issues. Greene, Tim // Network World;4/4/2011, Vol. 28 Issue 7, p16 

    The article announces the advisory coming from International business Machines (IBM) Corp. which cautioned information technology (IT) staff to look over the use of mobile devices and cloud infrastructure on business networks due to its vulnerabilities. According to IBM, Internet attackers have...

  • Security Pros & the Stuxnet Worm.  // eWeek;10/18/2010, Vol. 27 Issue 18, p42 

    The article offers information on the Stuxnet malware whose activity is demonstrated in an eWEEK.com slideshow.

  • State Cyberterrorism: A Contradiction in Terms? Jarvis, Lee; Macdonald, Stuart; Nouri, Lella // Journal of Terrorism Research;Sep2015, Vol. 6 Issue 3, p62 

    This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical...

  • FUTURE DEFENSES.  // Popular Science;Apr2011, Vol. 278 Issue 4, p72 

    The article discusses computer data security, means that are used to attack computer data held in the cloud or Internet, means used to defend against those attacks, and prices paid for personal information that hackers steal. Attack mechanisms are discussed including imposter software...

  • CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CROWD IN A CLOUD COMPUTING ENVIRONMENT. Jeyanthi, N.; Shabeeb, Hena; Mogankumar, P. C. // International Journal of Network Security & Its Applications;Sep2013, Vol. 5 Issue 5, p129 

    The latest trend in the field of computing is the migration of organizations and offloading the tasks to cloud. The security concerns hinder the widespread acceptance of cloud. Of various, the DDoS in cloud is found to be the most dangerous. Various approaches are there to defend DDoS in cloud,...

  • FUTURE DEFENSES.  // Popular Science;Apr2011, Vol. 278 Issue 4, p72 

    The article discusses computer data security, means that are used to attack computer data held in the cloud or Internet, means used to defend against those attacks, and prices paid for personal information that hackers steal. Attack mechanisms are discussed including imposter software...

  • 10 Safe Bets. Westervelt, Robert // CRN;Jun2013, Issue 1334, p11 

    The article offers information on several data security products including FireEye Advanced Malware Protection System from FireEye Inc., Zscaler Cloud Security Platform from Zscaler Inc. and TaaSera Malware Behavior Detection System from TaaSERA Inc.

  • CloudTaint: an elastic taint tracking framework for malware detection in the cloud. Yuan, Jinfeng; Qiang, Weizhong; Jin, Hai; Zou, Deqing // Journal of Supercomputing;Dec2014, Vol. 70 Issue 3, p1433 

    Full-system, fine-grained taint tracking has been proven to be a novel approach for the detection of malwares, especially for privacy-breaching and kernel buffer overflow malwares. On-demand emulation achieves a taint tracking framework in the cloud through switching a running system between...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics