
Vulnerabilities: a never ending story
Vulnerabilities in software are one of the most important attack vectors for hackers. Unpatched software has been responsible for dozens of large-scale and unfortunately successful attacks in the...

Addressing Cryptocurrency Trading Security Issues
Cryptocurrency trading has been gathering pace over the past few years and has been compared to the American Wild West. Early adventurers have faced tremendous risks in terms of extreme market...

Easy money: Cryptocurrency mining trojans are trending
It’s hard to miss the irony of the British government’s Information Comissioner’s Office (ICO) being targeted by an illegal cryptocurrency mining campaign. After indications that attackers had...

What does built-in IIoT security look like?
What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Using the public cloud securely
Cloud usage has become a rule rather than an exception in businesses of all sizes. In 2016, cloud usage in all businesses reached 65 percent in Germany. It doesn't matter how large or small a company...

To Succeed, Open Banking Must First Allay Privacy Concerns
The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

Cover up to avoid unwanted close-ups
Video surveillance is a sensitive issue, as the discussions about more cameras in public places show. It is no wonder that cameras on devices used in private areas which are capable of taking close-up...

Key risks for enterprises committing sensitive data to the cloud
Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

Top Concerns for Digital Assistants in the Workplace
Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

IoT – a paradigm shift?
Whether 2018 or 2020 is the year of the Internet of Things doesn’t matter – eventually networked devices will take over the home. This will probably happen sooner rather than later, especially with...