Spear Phishing in Sony’s Waters

Sony under virtual attack again

Recent attacks on Sony by as an yet unidentified hackers has revealed how easily a lax security system can lead to millions of dollars worth of damage.

According to some reports, the recent breach of Sony’s security, which involved the theft of several unreleased movies as well as possible employee personal data, was most likely caused by a targeted phishing email. ‘Spear phishing’ emails are becoming more commonplace as hackers utilize them to infect targeted companies’ machines with malicious software. Combined with identified system vulnerabilities, hackers are able to map the network and gain access to sensitive data. Okay, this might be a simplification of the actual attack.

(more…)

Continue Reading

Big Data: A Breath of Fresh Air

Using Big Data to Help You Breathe Fresh Air

It should be noted that Big Data and Healthcare will be getting a lot of attention for the remainder of 2014 through to 2015. Besides, the value of various data businesses can be noticed in various components. At times it is due to the ability of data businesses to collect richer data than before, or a combination of it.

Both analysts and marketers view Big Data as the buzzword de jour. One just has to look at the co-founder of Breezometer, Ziv Lautman who went ahead to obtain and decipher huge amounts of data on the quality of our air.

(more…)

Continue Reading

Processing Big Data via the Cloud

Big Data has recently unlocked a number of Big Opportunities for businesses. Let’s take a look at what exactly Big Data is, what kind of computing power is required and why cloud computing is perfectly positioned to make Big Data projects both possible and cost effective.

Big is of course relative, and while some organisations might baulk at the idea of managing databases in excess of hundreds of gigabytes, others may only start feeling challenged when the data sets reach hundreds of terabytes. Big (or volume of data) is however only one aspect of Big Data. Other factors include the velocity of data coming in and out of the database and the range of different data types that need to be captured, curated, managed and processed within an acceptable period of time.

(more…)

Continue Reading