From july 29th forward, CloudVPS have changed their configurations for new VPS instances on our traditional Xen and Hyper-V platform. This means that you can get double the hard disk space with the VPS products ranging from VPS1 to VPS4 inclusive, at the same price level as before. We have also upgraded our CPUs from 2.6 to 3.2GHz.
Information security plays a critical role within CloudVPS: The security and protection of both your and our data is central to our mission. One measure that can be helpful to such a policy is the adoption of ISO27001, a standard in the same area of security.
A new version of the standard was published in September, 2013. This updated version simplified a number of its elements, and improved on its overall structure.
CloudVPS is continuously working on developing new services. A great functionality gap on our current Hyper-V platform is the possibility of snapshots. After an extensive search, we have finally settled on a candidate that can fill this gap. At the moment we are testing internally with Veeam on our platform.
CloudVPS has launched her mobile-friendly website today. As of now the layout of the website is not limited to fixed desktop dimensions but will scale with the dimensions of your device.
Recently a vulnerability in Magento was discovered that allows attackers to gain unauthorized access to your webshop. This unfortunately also means attackers can thereby access all information in your webshop including your customer database and the backoffice.
On monday the 16th of March, CloudVPS will change the opening hours for its telephone service desk. Starting on the 16th you can reach us for telephonic support every working day from half past eight in the morning till six in the evening.
Yesterday a vulnerability in glibc was disclosed, one which requires an update. The vulnerability allows attackers to run arbitrary code on affected servers and thereby gaining access to these systems. In more technical terms the vulnerability consists of a buffer overflow issue, which can be abused via a remote arbitrary code exploit.
On the 19th of May we have launched our OpenStack Compute platform. Over the summer hundreds of customers have put the platform into use running more than a thousand servers at the moment.
The initial prices and packages were determined on a very conservative basis. Now we are getting an increasing amount of information regarding the actual performance of the platform it turns out to be so high that we can start using somewhat less conservative assumptions. This means our cost prices reduces and we can pass that advantage on to our customers. We implemented a CPU upgrade last month. This time we want to adjust our virtual server packages (Flavors) and the pricing of Volumes (extra harddisks) in favor of our customers.
Another day, another major vulnerability in an important piece of software. Wordpress, one of the most widespread CMS’es in the world, has recently released a new version in order to close a vulnerability which allows attackers unauthorized access to your environment.
When a user logs into Wordpress so-called ‘authentication cookies’ are created and placed on your computer. These authentication cookies contain information regarding the user and authentication and are used for providing access. However, it now seems those authentication cookies can be forged by an attacker, thereby granting full access to your environment.
This morning a vulnerability in OpenSSL was disclosed, which allows secure connections to be intercepted.
The OpenSSL package is used for setting up encrypted connections such as SSL and TLS. You may know these connections as SSH connections to your server or the encrypted HTTPS connections in your browser. You may know these connections as the encrypted connections in your webbrowser indicated by a green lock-icon.
Today a vulnerability called the Heartbleed Bug was disclosed which allows malicious parties to eavesdrop on your encrypted connection, making the encryption ineffective. This also means that transmitted passwords can be captured.