BSI annual report diagnoses further increase in threat situation
Itsecurity placeholder

( Source: www.tagesschau.de )
» Read more
"Employees need seamless and secure access to corporate resources wherever they work."
Thumb 785a7734  uwehauth brian foster bild 6

No matter for what reasons – teleworking, customer visits, remote office - employees are increasingly no longer working in the office. In order to secure sensitive company data outside their own building, companies need an appropriate concept. How does a Zero Trust based UEM fit in?

As traditional network perimeters become obsolete, organizations need a mobile-centric, trusted approach that validates each device, establishes the user context, verifies app authorization, validates the network, and detects and resolves threats before granting secure access to a device or user. They need...

» Read more
Almost all cyber attacks target the human factor
Itsecurity placeholder

( Source: www.inside-it.ch )
» Read more
Watch out, cryptography!
Thumb analytics 3088958 1280

"Backdoors" are the rule.

Testing hardware and debugging software is not trivial today. How do you test millions of lines of code or billions of transistors? The more complex the technology, the more creative approaches are needed. Cryptographic systems often present an additional challenge. After all, many testing procedures are ultimately about checking whether the system delivers the output that matches the input. Cryptographic methods can also be reliably tested with known input-output pairs. Such input-output pairs are called test vectors and are usually provided by the...

» Read more
Companies do not protect their cloud data
Itsecurity placeholder

( Source: www.it-business.de )
» Read more
Danger by (e-)mail
Itsecurity placeholder

( Source: www.it-business.de )
» Read more
Ransomware and Co: Mobile Security Remains a Challenge
Thumb apple 1841553 1280

A link in an online forum advertises the best mobile app available - without further information about the content, without screenshot, without technical data. An IT professional would never click such a link. Or? Well, a large number of forum visitors have done it and thus launched a new avalanche of Android Ransomware.

 

Anatomy of a Ransomware Attack

Android Filecoder.C is the name of the blackmailer Trojan whose rapid spread ESET has been observing since mid-July. The strategy of the ransomware can now be understood relatively clearly: Via an infected link in online forums, the...

» Read more
IT security market continues to grow
Itsecurity placeholder

( Source: www.it-business.de )
» Read more
Data breakdowns cost companies dearly to pay
Itsecurity placeholder

( Source: www.all-about-security.de )
» Read more
The Tank-Crackers of the 21st Century: New Alliances Against Banking Trojans
Thumb adult 3327336 1280

March 2018: Europol succeeds in striking a decisive blow against organised cybercrime. Over five years, a professional hacker gang had captured one billion euros. Among the victims were 100 banks from over 40 nations. With the help of infiltrated malware, the criminals had not only managed to manipulate the account balances of bank customers, but also to dispense this money at will via regular ATMs. Anyone hoping for an end to the cyber attacks against banks after the successful Europol strike should be informed of this as early as June 2018: This time hackers managed to capture 10 million...

» Read more