Kategorie: Cybercrime

Blog · Cybercrime · Data Security

U.S. Moves to Track Cryptocurrency Transactions

Staying safe while online remains a major concern for most Internet users. Companies of all sizes and across all industries are taking whatever steps necessary to keep their employees safe and...

Cybercrime · Data Security

The dawn of a new era – taking responsibility for the security of our own data

IT professionals often face different attitudes to IT security. Private individuals, even if they are occasionally in the public interest, generally believe that they "have nothing to hide" and that...

Cybercrime · Cybersecurity Strategy · Data Security

The difference between awareness and action

Do you remember Equifax? Maybe in combination with the word "hack"? The Equifax hack in September 2017 was one of the most momentous attacks in recent history. The hackers stole about 143 million...

Cybercrime · Data Security

The Worst Data Breaches of 2018

Data is one of the most significant assets in the hands of the corporations in this information technology era. Therefore, a data breach has serious effects on any business. 2018 has seen an increase...

Cybercrime · Cybersecurity Strategy · Data Security

State intervention – Rescue or ruin?

In recent months, a number of government agencies have been campaigning for state intervention in IT security. This includes an initiative to enforce a minimum level of security for home and small...

Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

Urgent, Important or Both: Setting Priorities in IT Security

The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

Cybercrime · Cybersecurity Strategy · Data Security

The Enemy Camped in Your Server

Last week got off to a sensational start with reports of custom chips discovered in Supermicro serverboards that were designed to smuggle malware into companies. Apple, Amazon and dozens of other top...

Cybercrime · Endpoint Management

Security risk through USB cable attacks

USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

Cybercrime · Cybersecurity Strategy

IT Security Costs Money, no IT Security Costs More Money

British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data...

Cybercrime · Cybersecurity Strategy · Data Security

Tiny loopholes that can wreak havoc

Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK