Posts Tagged ‘data security’

By:


Date:
Aug 3, 2016
Rural Telecom Magazine decided to highlight the need for cloud and hosting solutions in rural areas. Please review the article published in this month's publication in which they highlighted Codero CEO, Emil Sayegh, to discuss the technology challenges and the available solutions.  Rural Telecom is published by NTCA–The Rural Broadband Association six times a year. BRINGING THE CLOUD TO RURAL FARMS AND BUSINESSES Public health, education, high-tech farming and agriculture, seismic data collection, oil exploration and production, clean energy generation and management, transportation and disaster management are examples of… Read More
Christina Halliday
By:


Date:
Apr 22, 2016
Distributed Denial of Service (DDoS) attacks aren’t infamous for their sophistication; however, they’re increasing adaptability warrants a fresh look at the evolving anatomy of these dynamic threats. What is a DDoS attack? A DDoS attack is an attempt to consume one or more finite resources on a target computer or network of computers. These attack vectors block genuine users from accessing the network, application, or service and exploit detectable vulnerabilities. What are the types of DDoS attacks? Although there is a broad spectrum of types… Read More
By:


Date:
Mar 22, 2016
The evolution of technology has fundamentally changed the security landscape. The trench warfare style of a static frontline for computer security has given way to guerilla warfare. In the past few weeks alone, we’ve seen the Glibc vulnerability and the DROWN SSL vulnerability. Cybersecurity risks pose increased threat to your business, which can be subjected to significant liabilities if your network falls victim to a cyber-related attack. Safeguard your environment and your business by reviewing the five actions crucial for preparedness: identify, protect, detect, respond,… Read More
By:


Date:
Mar 1, 2016
Today, researchers from a number of universities and organizations around the world announced the DROWN SSL exploit.  DROWN, an acronym standing for Decrypting RSA with Obsolete and Weakened eNcryption, is an exploit that allows for remote decryption of SSL communications even if they’re protected by more advanced cipher suites. DROWN was assigned CVE CVE-2016-0800. Read a detailed analysis and fix to this vulnerability at DROWNattack.com Who is Affected? Anyone who uses SSL for any services including, but not limited to, HTTPS or IMAPS should assume… Read More
Emil Sayegh
By:


Date:
Feb 19, 2016
The Vulnerability: Recently, security researchers working for Google and Red Hat announced a vulnerability in a library commonly used in Linux environments.  Specifically, Glibc getaddrinfo() is susceptible, under certain conditions, to a stack-based buffer overflow attack while performing DNS queries.  This vulnerability has been designated CVE-2015-7547. Who is Affected? Any server running Linux with glibc 2.9 or later is affected.A complete list of the linux distributions affected can be found on the nixCraft community site. What do I need to do? If you are a Proactive Managed customer, we… Read More
By:


Date:
Jan 22, 2016
If you’re running a server or desktop with Linux Kernel 3.8 or higher, you and your website or application are vulnerable to a very serious 0-day local privilege escalation vulnerability. Millions of Linux systems around the world are vulnerable to compromise and must be patched. What Damage Can the Linux Vulnerability Cause? This bug (referred to as CVE-2016-0728) affects the keyrings facility in the kernel, allowing the kernel to cache security data, authentication keys, and other sensitive data. The bug creates a leak in the… Read More