info@smidcloud.com
  • Facebook
  • Twitter
  • RSS
  • Facebook
  • Twitter
  • RSS
  • Doubts?
  • English
    • Español
    • English
    • Deutsch
SMiD Cloud, secure encryption solutions
  • Home
  • How It Works
  • Solutions
    • SMiD Pro
    • SMiD Business (en)
  • Services
  • Partners
  • Contact
Select Page
Strava Fitness Application is Giving Away Locations (US Military in Peril)

Strava Fitness Application is Giving Away Locations (US Military in Peril)

by Smidcloud | Jan 30, 2018 | Cybersecurity breaches and incidents, Security

Concerns have been shown by the US military offices against Strava, a fitness application, which offers a heat map feature. This feature has resulted in exposing the important military locations of the United States all around the world. Earlier in November of 2017,...
10 Major Cloud Security Slip Ups in 2017

10 Major Cloud Security Slip Ups in 2017

by Smidcloud | Jan 18, 2018 | Cybersecurity breaches and incidents

Year 2017 is marked as the year of doom for cybersecurity specialists. This year, some of the major infrastructures in the corporate world of Unites States of America got struck with dreadful blows. Officials were left in bewilderment and disbelief when the latest...
5 Leading Cybersecurity Trends in 2018

5 Leading Cybersecurity Trends in 2018

by Smidcloud | Jan 15, 2018 | Cybersecurity breaches and incidents, Security

Last year was a real blast for cyber security criminals. Leading cyber-criminal conducts were carried out such as the noteworthy incident of Equifax, losing data worth millions, Wannacry ransomware attack which infected more than 400,000 machines across 150 countries,...
Meltdown and Spectre, how they were identified and how to avoid them

Meltdown and Spectre, how they were identified and how to avoid them

by Smidcloud | Jan 10, 2018 | Security

How exactly were Meltdown and Spectre Identified? It was one fine weekend morning when three researchers from Graz’s university sat on their computer workspaces and started working on their codes. Earlier that week, the trio came up with an idea about creating a...
KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

by Smidcloud | Oct 30, 2017 | Cybersecurity breaches and incidents

The KRACK (Key Reinstallation) attack takes advantage of a security flaw found in the WPA2 protocol.  This is the protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi can exploit these weaknesses using KRACK; this...

Related Posts

  • Cloud storage and privacy
  • Cybersecurity breaches and incidents
  • Gadgets, jokes and tendencies
  • Security
  • SMiD Cloud News

Recent Articles

  • Strava Fitness Application is Giving Away Locations (US Military in Peril)
  • Cloud Memes to Give You the Perfect Morning Kick of Laughs!
  • 10 Major Cloud Security Slip Ups in 2017
  • 5 Leading Cybersecurity Trends in 2018
  • Meltdown and Spectre, how they were identified and how to avoid them
  • Facebook
  • Google
  • LinkedIn
  • Twitter
  • YouTube
  • RSS

Designed by Elegant Themes | Powered by WordPress