Is Your “Cloud” Safe From Cross-Tenant Side-Channel Attacks?

The X-force Blog has a good post about Platform as a Service (PaaS) cloud   (#28 in Security analyzed page) http://securityintelligence.com/platform-as-a-service-paas-cloud-side-channel-attacks-part-ii/#.VZq8NflglmM   The Platform as a Service is a certain kind of Cloud service.  In some cloud services your data resides on machines dedicated for your company (IaaS) – Infrastructure as a Service. In PaaS … Read more

What Do Compromised Websites Look Like?

Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen from the Magento Ecommerce platform for a period of time.   Magento is an Ecommerce web system.   It Looks like Magento also had a … Read more

Newsflash: Hackers Hack Firmware on Drug Pump

Newsflash to all CEO’s when do you understand the problem of no mistakes no matter the potential of attack? Bruce Schneier https://www.schneier.com/blog/archives/2015/06/hacking_drug_pu.html Hospira Infusion drug pumps: http://www.hospira.com/en/products_and_services/infusion_pumps/ So the infusion pump helps reduce clinical safety and is now on the network. Guess what will happen next? Hackers will hack… Sure it may take some time … Read more

XARA – An old way to hack: Cross Application Resource Access

Cross Application Resource Access = XARA  is another way to hack applications on a computer, it was researched with the following paper:  https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view The Mac OSX and iOS operating systems were tested in the research paper by the 6 researchers:  Luyi Xing,  Xiaolong Bai, tongxin Li, XiaoFeng Wang, Kai Chen, and Xiaojing Liao In fact … Read more

Criminal Hackers Will Find Your Weaknesses

Criminal tattoos – these are the guys attacking us.  The Criminals have multitude of tools at their disposal, just like anybody with technical aptitude does. And just like water flows and creates new channels as it runs downhill the hacker will find your weakness. Because the Hacker Economy is now in the hundreds of millions … Read more