MASIGNCLEAN104

Amazon Cloud Tin Last Used To Hack Into Networks !

iklan banner
A Germany-based security researcher says he tin hack into protected networks using software that runs on Amazon’s cloud-based computers, according to a Reuters report.

Thomas Roth, a estimator security consultant based inward Cologne, Germany, says he has “figured out a quick as well as cheap means to interruption a normally used shape of password protection for wireless networks using powerful computers that anybody tin lease from Amazon.com Inc over the Web,” the study said.
According to Roth, he tin hack into protected networks using specialized software that he has written that runs on Amazon’s cloud-based computers. It tests 400,000 potential passwords per instant using Amazon’s high-speed computers, according to Reuters report.
Amazon offers pay-as-you-go Web services for companies who don’t desire to lay out the majuscule to buy as well as run the equipment. The Seattle-based society simply announced it lowered usage pricing on existing premium back upward offerings past times l portion as well as added 2 novel back upward plans to come across the needs of developers as well as businesses of all sizes as well as technical ability.
Roth said that the networks tin live on broken into if hackers role plenty estimator mightiness to “brute force” their means into figuring out the passwords that protect networks – specifically, information that travels across WiFi networks.
“That encryption method, dubbed WPA-PSK, scrambles information using a unmarried password. If a potential intruder is able to figure out the password, he or she tin compass access to computers as well as other devices on the network,” the Reuters study said.
Amazon officials tell the society uses multiple layers of operational as well as physical security to ensure the integrity as well as security of your data. Amazon spokesman Drew Herdener told Reuters that testing is an first-class role of AWS, however, “it is a violation of our acceptable role policy to role our services to compromise the security of a network without authorization.”

News Source : Amazon
Share This :