Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

NSA makes reverse-engineering tool GHIDRA open source

NSA makes reverse-engineering tool GHIDRA open source

The U.S. National Security Agency (NSA) plans to create a framework for the reverse engineering of popular operating systems in the spring open source. It's the GHIDRA framework, reports Silicon Angle. The framework works by breaking down software into assembly code so that people can analyze it. Th... Read more

date5 years ago
Vulnerability in Skype makes bypassing lock screen Android possible

Vulnerability in Skype makes bypassing lock screen Android possible

There was a bug in Skype that made it easy to bypass Android security. It's the combination of bad design and a bug that made it possible to bypass Android's locking screen by answering a Skype call. That's what nineteen-year-old bughunter Florian Kunushevci reports to The Register. The bughunter di... Read more

date5 years ago
Hackers threaten to publish insurance documents from 9/11

Hackers threaten to publish insurance documents from 9/11

A hacker group called The Dark Overlord announced Monday that it had hacked into a law firm. This law firm handles cases related to the attacks of 9 September 2001. The hackers now threaten to publish a large number of internal files, unless a ransom is paid. The Dark Overlord announced the attack ... Read more

date5 years ago
Hacker finds zero-day to overwrite files in Windows 10

Hacker finds zero-day to overwrite files in Windows 10

A hacker has found a new way to break into the Windows 10 app security model. SandboxEscaper, who has been able to find three zero-day bugs in Windows over the past four months, has found another one. This is an error that makes it possible to overwrite files. The security researcher published on th... Read more

date5 years ago
Ransomware flattens networks of several major American newspapers

Ransomware flattens networks of several major American newspapers

Last weekend, the printing works and deliveries of several large American newspapers came to a standstill. This is due to an attack that may have been carried out with the Ryuk-ransomware. The attack had an impact on, among others, printers of Tribune Publishing, one of the largest publishers of reg... Read more

date5 years ago
Urgent update of Internet Explorer disables certain Lenovo laptops

Urgent update of Internet Explorer disables certain Lenovo laptops

A few days ago, Microsoft released a rush update for Internet Explorer. That patch ensured that a zero day vulnerability could no longer be exploited by malicious parties. But now it appears that the spoedupdate has unforeseen consequences: some Lenovo laptops do not start up after installing the pa... Read more

date5 years ago
1 247 248 249 250 251 267