• Home
  • Blog
  • About
  • Contact
CloudAve
Software in Business. The Business of Software.
  • Business
    • Analysis
    • Entrepreneurship
    • Marketing
    • Strategy
    • Small business
  • Technology
    • Application Software
    • Infrastructure
    • Open Source
    • Mobile
    • Platforms
    • Product reviews
    • Security
  • Misc
    • Design
    • Just for fun
    • Trends & Concepts
  • Your POV
  • Sponsors
Browse: Home / hacking

hacking

We Got Hacked, Now What?

We Got Hacked, Now What?

By Chirag Mehta on March 18, 2013

Hopefully you really have a good answer for this. Getting hacked is no longer a distant probability; it’s a harsh reality. The most recent incident was Evernote losing customer information including email addresses and passwords to a hacker. I’m an Evernote customer and I watched the drama unfold from the perspective of an end user. […]

Posted in Featured Posts, Security | Tagged evernote, hacking, Security | 1 Response

Public Honeynet Data - Who are the top 20 hacking countries?

Public Honeynet Data – Who are the top 20 hacking countries?

By Dan Morrill on March 7, 2013

Public Honeynet Data – Who are the top 20 hacking countries? I could watch this site all day. In case you were wondering really wondering who the top hacker countries are, the German Alliance for Cyber Security has a dashboard display as to what is happening on 97 honeypots around the internet. It makes for […]

Posted in Featured Posts, Security | Tagged china, hacker, hacking, honeynet, Honeynet Project, Russia, United States

The best Spam Message I have ever received

The best Spam Message I have ever received

By Dan Morrill on June 28, 2012

Sometimes you just get an awesome spam message that is too sweet not to pass up. Today I got one that simply rocks. Everything left intact, including typos, formatting, and grammar. Simply brilliant.   Anti-Terrorist and Monetary Crimes Division Fbi Headquarters In Washington, D.C. Federal Bureau Of Investigation J. Edgar Hoover Building 935 Pennsylvania Avenue, […]

Posted in Just for fun | Tagged Federal Bureau of Investigation, hacking, J. Edgar Hoover Building, Pennsylvania Avenue, United States, Washington, Washington DC

Cooperating with Law Enforcement in Social Networking

Cooperating with Law Enforcement in Social Networking

By Dan Morrill on March 19, 2012

Social Networking is facing the prospects of being deputized by the Australian Image via CrunchBase Federal Police, Facebook, and other social networking sites are increasingly becoming one of the most important sources for intelligence about people. Forget neighbors talking to the police, now we are looking at our socially connected world as being involved with […]

Posted in Security | Tagged Australia, Australian Federal Police, facebook, hacking, police, Social network, Social network service, World Wide Web

One of the members of LulzSec reported to be an FBI mole

One of the members of LulzSec reported to be an FBI mole

By Dan Morrill on March 6, 2012

So much for not selling out your gang. It looks like Sabu one of the folks who has been speaking for LulzSec has been secretly working for the FBI according to multiple online reports. Lulzsec has been one of the leading hacking groups and has seriously gone after a ton of people, companies, and others […]

Posted in Security | Tagged FBI, Federal Bureau of Investigation, hacking, leadership, LulzSec, Sabu

OSCON: Energy + Awesome + Space Exploration + Hacking

OSCON: Energy + Awesome + Space Exploration + Hacking

By Adron Hall on July 29, 2011

I wanted to post these two keynotes from OSCON 2011. They really bring out the spirit of exploration, adventure, care, and doing things bigger than oneself. This is about doing things that go beyond the cat picture of the day. These presentations, well, I’ll let them speak for themselves. Absolutely great!

Posted in Featured Posts, General, Open Source | Tagged arial waldman, arielwaldman, conferences, google, hack, hacker, hacker news, hacking, opensource, oscon, Science Hack Day, space exploration, space hack day, steve yegge, twitter, video

OS Bridge Day #1: Hacking for Freedom

OS Bridge Day #1: Hacking for Freedom

By Adron Hall on June 21, 2011

Keynote: Hacking for Freedom

(Description of Hacking for Freedom)

Day #1 has kicked off with a bang. A keynote that really pulled at the heart strings for the love of freedom and liberty! The notion of technology being involved directly to those pushing for their freedom in other parts of the world is huge. Below I’ve snagged… read more…

Posted in Featured Posts, General, Open Source, Technology | Tagged Amazon Web Services, Android Developers, Apple, conference, Freedom, hack, hacking, hacktivism, IOS (Apple), liberty, open source software, os bridge, osbridge, oss, portland, simpledb, Telecomix, Unknown Code Ramblings, Urban Airship, wikileaks

Cloud based Business Intelligence as a Service

Cloud based Business Intelligence as a Service

By Dan Morrill on September 27, 2010

While Business Intelligence is not a new issue, cloud based business intelligence as a service (BIaaS) is a topic worth noting – because it is starting to catch on equaling the playing ground between big players in ERP and CRM with smaller players wh…

Posted in Trends & Concepts | Tagged accuracy, BIaaS, blippy, Business Intelligence, confidence level, data, data mining, hacking, Netflix, Offermatic, privacy | 1 Response

Surprising little information about Cloud Computing and Terrorism or Crime

Surprising little information about Cloud Computing and Terrorism or Crime

By Dan Morrill on September 16, 2010

All new technologies introduce security concerns, from faulty applications, to faulty configurations, to users who are simply dangerous in the new environment. A cloud computing infrastructure is no different from the basic idea of being misused, by an…

Posted in Infrastructure | Tagged aws, cloud computing, hacking, privacy, research, risk, risk management, Security | 2 Responses

Are You Still Using Your Real Credit Card Online?  You Shouldn’t.

Are You Still Using Your Real Credit Card Online? You Shouldn’t.

By Zoli Erdos on July 5, 2010

So iTunes got hacked and some users saw unauthorized purchases up to $600 in their accounts. I’m shocked.  Not at the fact that iTunes got hacked, but that users exposed their credit accounts to such extent.  Websites do get hacked, it’s a fact of life.  Users need to change their passwords, consider what other sites […]

Posted in Security | Tagged Apple, bank of america, bofa, citi, citibank, credit cards, fraud, hackers, hacking, itunes, online commerce, online shopping, paypal, secure card, Security, virtual credit card | 3 Responses

Cooperating with Law Enforcement in Social Networking

Cooperating with Law Enforcement in Social Networking

By Dan Morrill on June 8, 2010

Social Networking is facing the prospects of being deputized by the Australian Federal Police, Facebook, and other social networking sites are increasingly becoming one of the most important sources for intelligence about people. Forget neighbors talking to the police, now we are looking at our socially connected world as being involved with law enforcement. IT […]

Posted in Security | Tagged Australia, culture, data, data management, deluge, flood, hacking, law enforcement, process, reporting, social networking, society | 1 Response

Cleaning up after Antivirus Soft on Vista

Cleaning up after Antivirus Soft on Vista

By Dan Morrill on June 7, 2010

It has been about three years since I caught a computer virus, but a nasty little chunk of malware broke through my browser and Anti-Virus last night called Antivirus Soft. Here is a quick way of cleaning up after being taken out by this rogue chunk of malware in a few easy steps. The cleanup […]

Posted in Security | Tagged antivirus, Antivirus-soft, boot, hackers, hacking, malware, malwarebytes, reboot, remove malware, rogue software, safe mode, virus, vista, windows

Hacker Disables Cars via the Web - Our Remote Controlled Life

Hacker Disables Cars via the Web – Our Remote Controlled Life

By Zoli Erdos on March 17, 2010

This is what remote controlled toy cars looked like when I was a kid.  Yes, the control box was connected to the car with a 3-4feet cable… not exactly the level of freedom you get with today’s wireless models. But it was fun, nevertheless.  I wonder if 20-year-old Omar Ramos-Lopez had a toy car when […]

Posted in Security | Tagged Big Brother, hackers, hacking, privacy, remote control, remote sensors, sensors, smart meters, spy cam, sxsw, utility

Yes it is possible to resource starve a Cloud Computer

Yes it is possible to resource starve a Cloud Computer

By Dan Morrill on February 23, 2010

Over the weekend, my cloud computing infrastructure survived a major hacking attack. Here is what happened and what it took to recover it. This weekend my servers out in the cloud space fended off a major hacking attack across two of the systems that I have given the public access to use them. The attack […]

Posted in Security | Tagged attack, clean up, cloud, cloud computing, computing, DDOS, forensics, hack, hacke, hacking, linux, processes, resource starvation | 1 Response

Turn your IPod, Iphone or soon the Ipad into a hacker system

Turn your IPod, Iphone or soon the Ipad into a hacker system

By Dan Morrill on February 15, 2010

For all the complaints against apple for making it hard to get an application registered and sold in the Apple store, there are some very cool applications that can be used to set up your Iphone or other apple Iphone OS based system into an excellent scanning and pseudo hacker tool. These are the products […]

Posted in Security | Tagged Apple, applications, hack, hacker, hacking, ipad, iphone, iPod, programs, tools

Next »
feed mail facebook twitter linkedin

Popular Posts

  • Home
  • The Five-Step Maturity Model for Building a Collaborative Organization
  • Looking Back 2010: Key Cloud Acquisitions
  • Uncover latent needs with a simple question
  • From 24SevenOffice to 24SevenTravel and On to ...
  • User Interface and Cloud Computing - Part 1
  • The Discriminatory Dark Side Of Big Data
  • Driving SaaS Growth Through The Customer Lifecycle

Archives

Authors

  • Adron Hall
  • Chirag Mehta
  • Christian Reilly
  • Dan Morrill
  • Derek Pilling
  • Hutch Carpenter
  • Jarret Pazahanick
  • Jason M. Lemkin
  • Joel York
  • John Taschek
  • Krishnan Subramanian
  • Mark Suster
  • Michael Krigsman
  • Ofir Nachmani
  • Paul Miller
  • Quinton Wall
  • Randy Bias
  • Robert Duffner
  • Sadagopan
  • wprss
  • Zoli Erdos
Sponsored by: