Writer’s iCloud hacked as Wozniak calls cloud “horrendous”

Apple co-founder Steve Wozniak is hardly sitting on the fence with his opinions on the cloud

Speaking after a performance of Mike Daisey’s monologue “The Agony and the Ecstasy of Steve Jobs”, Steve Wozniak was in uncompromising mood concerning his thoughts on cloud computing.

Wozniak reportedly told the packed theatre audience: “I think [cloud’s] going to be horrendous. I think there are going to be a lot of horrible problems in the next five years”.

Five years is a long time. According...

By James Bourne, 06 August 2012, 2 comments. Categories: Hacking, Security.

Cloud Computing: essential to SMEs?

It has been reported this week that 65% of US small to medium sized businesses (SMEs) say that cloud computing is absolutely essential to their organisation and future growth plans. Meanwhile 59% have stated that their selection of

By VI, 24 July 2012, 0 comments. Categories: Enterprise, Security.

What are the 7 challenges facing federal cloud computing?

The United States Government Accountability Office (GAO) has found that, while the US ‘Cloud First’ enterprise project is making tangible progress, there are seven cloud lessons for the public sector.

The report, subtitled “progress made but future cloud computing efforts should be better planned”, charts the progress of Cloud First – a federal policy which exhorts agencies to find a cloud-based IT solution whenever logistically possible.

Things appear to have moved forward since...

By James Bourne, 16 July 2012, 0 comments. Categories: Enterprise, Infrastructure, Research, Security.

Establish secure remote access with limited staff and budgets

With some of the recent breaches of restaurant chains, I’ve got to think that many of them were related to poor remote access practices. I say this because in all of my years of consulting, I have found that very weak controls around the remote access is a lot more common than one would think.

Even today you will commonly find things like POS Servers directly accessible on the Internet via VNC, RDP, or pcAnywhere. I have even seen SQL databases that contain credit card data made directly accessible over...

By GreenPages Technology Solutions, 13 July 2012, 0 comments. Categories: Security.

Cisco's backtrack on Connect Cloud - taking privacy for granted?

Cisco has been forced to apologise for what Home Networking Vice President Brett Wingo described as “confusion and inconvenience” following the rolling out of their Connect Cloud system.

The issue concerns a cloud-based update Cisco made to their Linksys EA2700, EA3500 and EA4500 firmware which had originally been rolled out automatically to users’ routers.

The update took many users by surprise, and they weren’t best pleased...

By James Bourne, 09 July 2012, 0 comments. Categories: Adoption, Security.

Storms take Amazon cloud down – were you affected?

In the week that the International Working Group on Cloud Computing Resiliency reported worldwide cloud outages cost at least £45m over five years, the all-encompassing Amazon EC2 Cloud was down on Friday night due to heavy storms in Virginia.

From approximately 2300 EST on Friday users were unable to access various sites utilising the Amazon infrastructure cloud, including

By James Bourne, 02 July 2012, 0 comments. Categories: Consumer, Industry, Security.

Will CliQr end fears of cloud vendor lock-in?

As the Google I/O conference gets underway in San Francisco, a Google-backed start-up has launched a cloud solution which aims to eradicate vendor lock-in.

Cloud management providers CliQr Technologies has launched CloudCenter, a product which “enables applications to get to and fluidly move between clouds with optimal price-performance and without migration disruption and expense”.

The product will have an official unveiling at the...

By James Bourne, 27 June 2012, 0 comments. Categories: OpenSource, Security, Vendors.

Where to allocate resources in the cybercrime war

The cost of protecting ourselves against cybercrime can far outweigh the cost of the threat itself, according to a new study led by computer scientists at The University of Cambridge.

At the behest of the UK Ministry of Defence, the research team compiled the first estimate of direct, indirect and defence costs of different types of cybercrime.

The report’s authors, which included experts from Cambridge University, working with colleagues in Germany, the Netherlands, the USA and UK, concluded that...

By Matt Henkes, 18 June 2012, 0 comments. Categories: Compliance, Industry, Regulation, Security.