Developers are negligent with old vulnerabilities
Itsecurity placeholder

( Source: www.heise.de )
» Read more
Outsourcing IT security is an option for many companies
Itsecurity placeholder

( Source: www.automotiveit.eu )
» Read more
IT security incidents sharpen security awareness
Itsecurity placeholder

( Source: www.digitalbusiness-cloud.de )
» Read more
BSI annual report diagnoses further increase in threat situation
Itsecurity placeholder

( Source: www.tagesschau.de )
» Read more
"Employees need seamless and secure access to corporate resources wherever they work."
Thumb 785a7734  uwehauth brian foster bild 6

No matter for what reasons – teleworking, customer visits, remote office - employees are increasingly no longer working in the office. In order to secure sensitive company data outside their own building, companies need an appropriate concept. How does a Zero Trust based UEM fit in?

As traditional network perimeters become obsolete, organizations need a mobile-centric, trusted approach that validates each device, establishes the user context, verifies app authorization, validates the network, and detects and resolves threats before granting secure access to a device or user. They need...

» Read more
Almost all cyber attacks target the human factor
Itsecurity placeholder

( Source: www.inside-it.ch )
» Read more
Watch out, cryptography!
Thumb analytics 3088958 1280

"Backdoors" are the rule.

Testing hardware and debugging software is not trivial today. How do you test millions of lines of code or billions of transistors? The more complex the technology, the more creative approaches are needed. Cryptographic systems often present an additional challenge. After all, many testing procedures are ultimately about checking whether the system delivers the output that matches the input. Cryptographic methods can also be reliably tested with known input-output pairs. Such input-output pairs are called test vectors and are usually provided by the...

» Read more
Companies do not protect their cloud data
Itsecurity placeholder

( Source: www.it-business.de )
» Read more
Danger by (e-)mail
Itsecurity placeholder

( Source: www.it-business.de )
» Read more
Ransomware and Co: Mobile Security Remains a Challenge
Thumb apple 1841553 1280

A link in an online forum advertises the best mobile app available - without further information about the content, without screenshot, without technical data. An IT professional would never click such a link. Or? Well, a large number of forum visitors have done it and thus launched a new avalanche of Android Ransomware.

 

Anatomy of a Ransomware Attack

Android Filecoder.C is the name of the blackmailer Trojan whose rapid spread ESET has been observing since mid-July. The strategy of the ransomware can now be understood relatively clearly: Via an infected link in online forums, the...

» Read more