News Categories

Shell & Desktop Enhancements

Links



i-Cloud - an Insecure Device?
Thursday, 11 August 2011 04:52

 

Al MasloiCloudwski-Yerges, the director of consulting services at En Pointe Technologies, told the MacNewsWorld that the focus is changed from security to the atomic components of the individual machines, due to the advent of the cloud.

He says that the iCloud has the chances of higher risk levels, and cannot be used unless a good form of security is implemented along with it. As per his words, the device cannot be used unless some means of securing the data end is found out and implemented in it. He also says that any hacker can easily get the data from your device and plant data in your device, through a USB or emails or even the browsers.

Thus this device can be considered as the perfect way for a hacker to hack through your details and he considers the device to be a profit for such hackers. But as per Geoff Webb, the product marketing director at Credant Technologies, the Apple’s iCloud is expected to bring about a lot of cloud activities into the corporate world.He expects that in the coming years, more and more people in the corporate world would start using the Idevices, as it can become one of the most easy and comfortable way of transferring data to and from an older device!

 

He says that there are some other points to worry about, the fact that there is risk of secret information leaking out through the iCloud and the other important fact that the icloud can itself become a target of such malpractices. If such problems are avoided, he considers that the icloud is indeed a useful device, especially for the busy business men and the people working in a corporate world.

Gunter Ollmann, the Damballa's vice president of research,also supports the device saying that it is just an online data storage system that allows only authorized access and hence it wouldn’t be attractive or useful to any hacker. He says that the attackers are more likely to use the icloud for propagating malware among the many devices of a same person, and unless they have the authority code to access the device, he data in it is pefectly safe and sound.