This article explores the cloud computing security and cloud-specific vulnerabilities. Cloud computing’s core technologies – Web applications and services, virtualization, and cryptography – have vulnerabilities that are either intrinsic to the technology or prevalent in the technology’s state-of-the-art implementations.