
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

WordPress patches, but plugin remains vulnerable without update
Two WordPress plugins have received updates to fix vulnerabilities. The security-focused Jetpack plugin is ma...

New strain of spyware resides in Android SDK
A new form of spyware has been discovered in an Android SDK. The software development kit (SDK) has been used...

Screen recording app was spying on its users
ESET reports that an Android app was secretly spying on its users. iRecorder - Screen Recorder introduced mal...

User data hacker forum RaidForums made public in data breach
Hackers have given the formerly popular hacker forum RaidForums a post-mortem exposé akin to the old forum's...

Windows 11 on Arm gets same data protection as x86 version
A preview version of Windows 11 on Arm now includes Endpoint Data Loss Protection (DLP) policy options. This ...

US protests China’s ban on importing Micron memory chips
The latest action by China is seen as a reaction to trade restrictions imposed by the US last year. Commer...

Hackers use encrypted RPMSG attachments for phishing
Hackers are using encrypted Restricted Permission Message (RPMSG) files via compromised Microsoft 365 account...

WithSecure now provides visibility into insecure cloud configurations
WithSecure has enhanced its existing WithSecure Elements endpoint security platform with a Cloud Security Pos...

Veeam: cyber attacks target backups to force payment
New research by Veeam shows that attacks almost always (93%) target backups. That way, they try to force pay...

Google introduces Mobile Vulnerability Rewards Program
Google has introduced what it calls the "Mobile Vulnerability Rewards Program". The tech giant intends for th...