Post of category Cybercrime

Cybercrime · Cybersecurity Strategy · Data Security

State intervention – Rescue or ruin?

In recent months, a number of government agencies have been campaigning for state intervention in IT security. This includes an initiative to enforce a minimum level of security for home and small...

Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

Urgent, Important or Both: Setting Priorities in IT Security

The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

Cybercrime · Cybersecurity Strategy · Data Security

The Enemy Camped in Your Server

Last week got off to a sensational start with reports of custom chips discovered in Supermicro serverboards that were designed to smuggle malware into companies. Apple, Amazon and dozens of other top...

Cybercrime · Endpoint Management

Security risk through USB cable attacks

USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

Cybercrime · Cybersecurity Strategy

IT Security Costs Money, no IT Security Costs More Money

British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data...

Cybercrime · Cybersecurity Strategy · Data Security

Tiny loopholes that can wreak havoc

Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

Cybercrime · Cybersecurity Strategy · Internet of Things

New threats posed by closing the gap between IT and OT

The gap between office Information Technology (IT) and Operational Technology (OT) −everything that networks, controls and evaluates machines in industrial environments − has been closing for some...

Cybercrime · Public Hotspot · VPN

Hackers could use World Cup for their own end game

It’s not long now, in June the FIFA World Cup 2018 is set to kick off in Russia. Football is one of the most common shared interests in the world, fans are emotionally committed and play a big part in...

Cybercrime · Data Security

Easy money: Cryptocurrency mining trojans are trending

It’s hard to miss the irony of the British government’s Information Comissioner’s Office (ICO) being targeted by an illegal cryptocurrency mining campaign. After indications that attackers had...

Cybercrime · Data Security

Meltdown and Spectre – play down or panic?

Users have long since accepted that software errors can be exploited for digital attacks. In fact, these have become so frequent that only highly critical incidents make the news. Hardware is mostly a...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK