Cloud computing is a digital hell that burns data, security, reliability and privacy for users and companies, a technology cancer that within the short turn of a summer brought new evidence of the fact that the worst, for the fools willing to completely tie themselves to the feudal power system of the new digital Lords, is yet to come. It’s therefore important to keep a constant track of the incidents, the unfulfilled promises, the countless privacy violations and the pure and simple lies the unscrupulous corporations persistently try to sell as the future of everything. The future, on-line, has an expiration date and is intermittent.
After more than four years since the post with which this blog tried to highlight the dark side of that hollow and meaningless thing hidden behind the “cloud computing” moniker, I think it’s now time to go back on the topic with an annotated list of the most recent and remarkable horrors fallen down from the sky of Internet servers. The “mainframe 3.0″ class services promise a lot, keep very little and don’t give any guarantee on anything. Or to say it with the Apple co-founder Steve Wozniak, selling one’s own rights of ownership on software, data and products is the first stone of the road that leads to digital hell.
Someone could think that the strategies currently executed by cyber-criminals to extort personal information are sophisticated, dangerous and antivirus software-proof. Maybe it’s just like this, however it’s as much true that next to the fine technique the aforementioned criminals still use dirt cheap tricks against which there wouldn’t theoretically be any need for the antivirus at all. It would be enough to have one’s own brain always turned on when in front of the screen.
From a computer security standpoint, 2008 surely has been a year of passion. Nay worse, it has been a dramatic year characterized by figures beyond any imagination, a steady hammering of new threats that has lasted till the end and that is expected to be the same or even worse during this year.
Trend Micro security enterprise has ranked the attack vectors exploited by the 100 most widespread malware from January to November 2008, and the results speak by themselves: among all the possible infection ways Internet is absolutely the most used (or better still abused) one by worms, trojans and other types of digital pathogenetic agents constantly hunting for victims and unprotected systems to compromise.
It’s a picture full of shadows and few lights the one outlined in the quarterly security report by F-Secure, a well-known Finnish company that produces antivirus software and integrated protection solutions. By analyzing the striking cyber-crime cases reported during the third quarter of 2008, the wrap-up highlights the difficulty to effectively fight an international phenomenon with the only aid from the local laws and the current cooperation treaties between the police authorities.
Announcements of network apocalypses come from Las Vegas, where the major security experts have met to discuss about the state of things of the modern computer platforms during the Black Hat conference held the last week. The message given describes just a dramatic scenery, where Internet structural flaws couple with those as much as fundamental of Windows Vista to provide the “good fella” with an entire new rack of attacks against users and assorted net services.