Security

Security team discussed weakness in bare-metal services

Back door open. Never a good sign in a computer security environment. Researchers poking around are sure to call out their discoveries in an instance such as the recent one, where cloud servers looked as if they could be ...

Internet

Researcher studies power consumption of cloud infrastructures

In his doctoral dissertation at Umeå University, Jakub Krzywda has developed models and algorithms to control tradeoffs between the power consumption of cloud infrastructures and performance of hosted applications to enable ...

Security

Hacking group Winnti has targeted several industrial enterprises

Together with an investigative team at Bayerischer Rundfunk (BR) and Norddeutscher Rundfunk (NDR), researchers at Ruhr-Universität Bochum have unearthed how the hacking group Winnti, also known as APT10, commits its attacks ...

Security

Germany seizes server hosting pilfered US police files

At the behest of the U.S. government, German authorities have seized a computer server that hosted a huge cache of files from scores of U.S. federal, state and local law enforcement agencies obtained in a Houston data breach ...

Security

Zoom goes big on fix for conferencing vulnerability

Settle down in a comfortable chair; breaks with cool washcloths are allowed. This is one of those Zero-Day stories with discoveries, responses, still newer discoveries and assorted updates.

Internet

Domain name fraud: is the global Internet in danger?

In late February 2019, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that manages the IP addresses and domain names used on the web, issued a warning on the risks of systemic Internet attacks. ...

page 2 from 4