Attackers are using cloud services to mask attack origin and build false trust

Source- techrepublic.com Security experts love talking up the importance of trusted websites. Google’s dominant Chrome browser—which has held about two-thirds of the browser market share all year—emphasized the importance of this with its lock icon, indicating that traffic was encrypted. It’s a useful heuristic, easy for end users to understand. Lock equals security. It’s skeuomorphism at its best, but it lulls users into a false sense of security. A Wednesday report from Menlo Security finds that attackers are using cloud hosting services to avoid detection, opting to

Read more