DDoS Attacked HotSchedules -Down For 45 Hrs

http://www.darkreading.com/cloud/inside-a-vicious-ddos-attack/a/d-id/1321286 has the full story – it is worth your time for you to read it.   The technical overview by the CEO is the following (from article): { The assailants hit with 10- to 15 gigabytes per second (Gbps) of traffic – 250 times our standard rate. When I called my peers in banking and … Read more

Is Your “Cloud” Safe From Cross-Tenant Side-Channel Attacks?

The X-force Blog has a good post about Platform as a Service (PaaS) cloud   (#28 in Security analyzed page) http://securityintelligence.com/platform-as-a-service-paas-cloud-side-channel-attacks-part-ii/#.VZq8NflglmM   The Platform as a Service is a certain kind of Cloud service.  In some cloud services your data resides on machines dedicated for your company (IaaS) – Infrastructure as a Service. In PaaS … Read more

What Do Compromised Websites Look Like?

Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen from the Magento Ecommerce platform for a period of time.   Magento is an Ecommerce web system.   It Looks like Magento also had a … Read more

Newsflash: Hackers Hack Firmware on Drug Pump

Newsflash to all CEO’s when do you understand the problem of no mistakes no matter the potential of attack? Bruce Schneier https://www.schneier.com/blog/archives/2015/06/hacking_drug_pu.html Hospira Infusion drug pumps: http://www.hospira.com/en/products_and_services/infusion_pumps/ So the infusion pump helps reduce clinical safety and is now on the network. Guess what will happen next? Hackers will hack… Sure it may take some time … Read more

XARA – An old way to hack: Cross Application Resource Access

Cross Application Resource Access = XARA  is another way to hack applications on a computer, it was researched with the following paper:  https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view The Mac OSX and iOS operating systems were tested in the research paper by the 6 researchers:  Luyi Xing,  Xiaolong Bai, tongxin Li, XiaoFeng Wang, Kai Chen, and Xiaojing Liao In fact … Read more