Security
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
Quantum Key Distribution guarantees secure communication
Quantum Key Distribution is making inroads in the market of (network) communication. By employing some princi...
Goldoson malware infiltrates 60 Google Play apps
A new malicious Android malware known as "Goldoson" has infiltrated the Google Play Store, infecting 60&...
New CCPL initiatives support good-faith security research
The Center for Cybersecurity Policy and Law, an Infosec think tank, has announced two new initiatives aimed a...
‘Western Digital data in hands of hackers’
Storage vendor Western Digital has been the latest company to be hit by hackers. Some ten terabytes of data, ...
Defend your data from a ransomware attack
Ransomware is the fastest growing type of cybercrime. Analysts predict ransomware will attack a business ever...
Fortinet introduces FortiGate 7081F firewall appliance
Fortinet introduces the FortiGate 7081F Next-Generation Firewall (NGFW). The firewall promises data centers g...
DDoS attacks changing from targeting IoT to VPS infrastructure
This new generation of botnets uses leaked API credentials or known exploits to enslave vulnerable and miscon...
ChatGPT being used as an accomplice in cybercrime
Cybersecurity firm Cybersixgill has released a report on current trends in cybercrime. It shows that generati...
3CX implements forced update of PWA client after security incident
VoIP software vendor 3CX will soon implement a forced security upgrade of its progressive web application (PW...
How do the RagnarLocker cybercriminals operate?
Israeli cybersecurity company Sygnia has set its sights on RagnarLocker, a group of ransomware criminals. Usi...