SMiD Cloud Blog
What you need to know about technology and cybersecurity

Strava Fitness Application is Giving Away Locations (US Military in Peril)
Concerns have been shown by the US military offices against Strava, a fitness application, which offers a heat map feature. This feature has resulted in exposing the important military locations of the United States all around the world. Earlier in November of 2017,...
Cloud Memes to Give You the Perfect Morning Kick of Laughs!
Life up in the clouds can get mundane, don't you think? Well, be prepared to laugh yourself back to earth with these funny cloud friendly memes. We found the best ones so you don't have to wade through the mud. 10 Funny Cloud Memes to Send You Back into Fits of...
10 Major Cloud Security Slip Ups in 2017
Year 2017 is marked as the year of doom for cybersecurity specialists. This year, some of the major infrastructures in the corporate world of Unites States of America got struck with dreadful blows. Officials were left in bewilderment and disbelief when the latest...
5 Leading Cybersecurity Trends in 2018
Last year was a real blast for cyber security criminals. Leading cyber-criminal conducts were carried out such as the noteworthy incident of Equifax, losing data worth millions, Wannacry ransomware attack which infected more than 400,000 machines across 150 countries,...
Meltdown and Spectre, how they were identified and how to avoid them
How exactly were Meltdown and Spectre Identified? It was one fine weekend morning when three researchers from Graz’s university sat on their computer workspaces and started working on their codes. Earlier that week, the trio came up with an idea about creating a...
ALERT! Marcher Malware Is the New Threat in Android Town & It Attacks Your Bank Account in 3 Steps
The year 2017 introduced a lot of threats into the technology world. From cloud infrastructures to private data centers, nothing can be considered fully secure. One of the major threat to the Internet environment is malware. These are trained bots or software tweaks...
Bad Rabbit- A new ransomware hits Russia hard & spreads across globe
2017 so far is turning out to be quite a year for the ransomware attacks. Earlier this year, both WannaCry and Petya ransomware were in the news as they hit several companies and institutes across the world. Now another ransomware is creating a nuisance, particularly...
KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information
The KRACK (Key Reinstallation) attack takes advantage of a security flaw found in the WPA2 protocol. This is the protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi can exploit these weaknesses using KRACK; this...
Cyberattacks, Cyberterrorism or Cyberwar
News about computer incidents, cyberattacks and hackers appear every day in the media, but which were the first? How did it all start? We are going to review when cyberattacks began, how they have evolved and clarify the terms used. Violence is a complex concept and...