{"582946":{"#nid":"582946","#data":{"type":"news","title":"Is YOUR data safe in the cloud? Researchers reveal the \u0027lurking malice\u0027 in major services and say 10% have been compromised by hackers ","body":[{"value":"\u003Cp\u003EHundreds of repositories across nearly two dozen major cloud services are actively providing malware, including phishing, \u0026lsquo;drive-by downloads,\u0026rsquo; and fake sites, according to a new study.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe list includes domains from Google, Amazon, and Yahoo, and according to the team, the malicious content can be difficult to spot.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EResearchers say hackers could hide components of malware in separate locations in the cloud, allowing them to go untracked as individual items \u0026ndash; but, these seemingly innocent pieces can quickly be assembled to launch an attack.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn the study, researchers from the Georgia Institute of Technology, Indiana University Bloomington, and the University of California Santa Barbara created a scanning tool called \u0026lsquo;BarFinder\u0026rsquo; to track down the unique features of bad repositories.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe work was supported in part by the National Science\u0026nbsp;Foundation and involves ECE Professor Raheem Beyah and his Ph.D. student Xiaojing Liao.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.dailymail.co.uk\/sciencetech\/article-3852358\/Is-data-safe-cloud-Researchers-reveal-lurking-malice-major-services-say-10-compromised-hackers.html#ixzz4NipjnZMO\u0022\u003ERead the entire article at The Daily Mail\u003C\/a\u003E.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EHundreds of repositories across nearly two dozen major cloud services are actively providing malware, including phishing, \u0026lsquo;drive-by downloads,\u0026rsquo; and fake sites, according to a new study.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn the study, researchers from the Georgia Institute of Technology, Indiana University Bloomington, and the University of California Santa Barbara created a scanning tool called \u0026lsquo;BarFinder\u0026rsquo; to track down the unique features of bad repositories.\u0026nbsp;ECE Professor Raheem Beyah and his Ph.D. student Xiaojing Liao are on this research team.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"In the study, researchers from the Georgia Institute of Technology, Indiana University Bloomington, and the University of California Santa Barbara created a scanning tool called \u2018BarFinder\u2019 to track down the unique features of bad repositories."}],"uid":"27241","created_gmt":"2016-10-21 19:07:42","changed_gmt":"2016-10-21 19:17:50","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-10-21T00:00:00-04:00","iso_date":"2016-10-21T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[],"keywords":[{"id":"67741","name":"Raheem Beyah"},{"id":"109","name":"Georgia Tech"},{"id":"166855","name":"School of Electrical and Computer Engineering"},{"id":"172552","name":"cloud malware"},{"id":"2200","name":"Cyber Attack"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}