SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : View from the Center and Left -- Ignore unavailable to you. Want to Upgrade?


To: Metacomet who wrote (242269)1/16/2014 2:11:09 AM
From: bentway  Respond to of 541774
 
I've considered that, but I just don't buy new stuff. So, I don't think a Prime membership would pay off for me.



To: Metacomet who wrote (242269)1/16/2014 12:44:29 PM
From: bentway  Read Replies (1) | Respond to of 541774
 
Amazon is a hornet’s nest of malware

BY BRIAN FUNG
washingtonpost.com
January 16 at 9:51 am

Amazon's cloud computing service plays host to some of the most prolific malware distributors on the Internet, security researchers have discovered.

Of the 10 sites that pump out malware most frequently, four are hosted on Amazon Web Services (AWS) — including the number one site, download-instantly.com, according to a threat report published Wednesday by the IT security firm Solutionary.

The report comes a week after we learned that hackers allegedly used Amazon's cloud hosting solution as a platform for a botnet that scraped personal information from potentially millions of LinkedIn subscribers.

(Solutionary)

Cloud computing is becoming an attractive way for online criminals to launch attacks against businesses and consumers because of its low cost. It allows users to instantly set up an array of virtual servers that can be ordered to perform both legitimate and abusive functions.

Together, the four Amazon-hosted sites accounted for 6 percent of all malware Solutionary found in the fourth quarter of 2013, according to the report. Amazon (whose chief executive, Jeffrey P. Bezos, owns The Washington Post) is the leading malware host among global hosting providers, followed closely by GoDaddy.

The e-commerce giant has taken an active stance on its abusive customers. In 2009, after reports surfaced of a botnet controller living on AWS, the company said it had located the offending malware and shut it down. Amazon also operates an e-mail hotline dedicated to handling reports of AWS abuse.

(Solutionary)

But that hasn't stopped cybercriminals from taking advantage of Amazon's cloud service. In a 2009 presentation at the Black Hat security conference, one consultant demonstrated how AWS's massive computing power could be used as a super-powered password cracker. A typical eight-character alphanumeric password might cost as little as $45 to crack. More recently, AWS was found to be hosting SpyEye, a trojan that let hackers gain access to the online accounts of banking customers.

Amazon has argued that it's much better to find the malware on its own systems, where it can be cordoned off and eliminated, rather than have it hosted on the servers of other, less responsive companies.

"We take security very seriously, and investigate all reported vulnerabilities," the company writes on its threat reporting page.

A spokesperson for AWS did not return a request for comment Wednesday.