info@smidcloud.com
  • Facebook
  • Twitter
  • RSS
  • Facebook
  • Twitter
  • RSS
  • Doubts?
  • English
    • Español
    • English
    • Deutsch
SMiD Cloud, secure encryption solutions
  • Home
  • How It Works
  • Solutions
    • SMiD Pro
    • SMiD Business (en)
  • Services
  • Partners
  • Contact
Select Page
10 Major Cloud Security Slip Ups in 2017

10 Major Cloud Security Slip Ups in 2017

by Smidcloud | Jan 18, 2018 | Cybersecurity breaches and incidents

Year 2017 is marked as the year of doom for cybersecurity specialists. This year, some of the major infrastructures in the corporate world of Unites States of America got struck with dreadful blows. Officials were left in bewilderment and disbelief when the latest...
5 Leading Cybersecurity Trends in 2018

5 Leading Cybersecurity Trends in 2018

by Smidcloud | Jan 15, 2018 | Cybersecurity breaches and incidents, Security

Last year was a real blast for cyber security criminals. Leading cyber-criminal conducts were carried out such as the noteworthy incident of Equifax, losing data worth millions, Wannacry ransomware attack which infected more than 400,000 machines across 150 countries,...
Meltdown and Spectre, how they were identified and how to avoid them

Meltdown and Spectre, how they were identified and how to avoid them

by Smidcloud | Jan 10, 2018 | Security

How exactly were Meltdown and Spectre Identified? It was one fine weekend morning when three researchers from Graz’s university sat on their computer workspaces and started working on their codes. Earlier that week, the trio came up with an idea about creating a...
ALERT! Marcher Malware Is the New Threat in Android Town & It Attacks Your Bank Account in 3 Steps

ALERT! Marcher Malware Is the New Threat in Android Town & It Attacks Your Bank Account in 3 Steps

by Smidcloud | Nov 13, 2017 | Cybersecurity breaches and incidents

The year 2017 introduced a lot of threats into the technology world. From cloud infrastructures to private data centers, nothing can be considered fully secure. One of the major threat to the Internet environment is malware. These are trained bots or software tweaks...
KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

by Smidcloud | Oct 30, 2017 | Cybersecurity breaches and incidents

The KRACK (Key Reinstallation) attack takes advantage of a security flaw found in the WPA2 protocol.  This is the protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi can exploit these weaknesses using KRACK; this...

Related Posts

  • Cloud storage and privacy
  • Cybersecurity breaches and incidents
  • Gadgets, jokes and tendencies
  • Security
  • SMiD Cloud News

Recent Articles

  • Strava Fitness Application is Giving Away Locations (US Military in Peril)
  • Cloud Memes to Give You the Perfect Morning Kick of Laughs!
  • 10 Major Cloud Security Slip Ups in 2017
  • 5 Leading Cybersecurity Trends in 2018
  • Meltdown and Spectre, how they were identified and how to avoid them
  • Facebook
  • Google
  • LinkedIn
  • Twitter
  • YouTube
  • RSS

Designed by Elegant Themes | Powered by WordPress