
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Security researcher installs ransomware on Canon camera
A security researcher from Check Point Software Technologies has demonstrated a technique that makes it possib...
Serious vulnerabilities found in 40 drivers with Microsoft certification
Eclypsium security researchers have found serious vulnerabilities in more than 40 drivers of 20 hardware vendo...

Number of cyber attacks reached record heights in the past quarter
Attack traffic reached a record high in the second quarter of 2019. That's what Fortinet's Global Threat Lands...

Data leakage costs increased by 12 percent over the past five years
The cost of a data breach has risen by 12% over the past five years. This is the conclusion of an annual IBM S...

Microsoft makes Azure Security Center for IoT widely available
Microsoft has made its Azure Security Center for IoT publicly available. The service, introduced in March, foc...

Hundreds of AWS backups leak sensitive data
Various companies, start-ups and governments are leaking their own files from the cloud. This is shown by new ...

More than 7.4 million Android devices contain pre-installed malware
Pre-installed malware was found on more than 7.4 million Android devices. The malware was able to take over de...

Kaspersky: Sodin-ransomware used zero day in Windows and CPU architecture
The ransomware Sodin uses a zero day leak in Windows to obtain access rights to infected systems. In addition,...

Apple offers record amount of million U.S. dollars at iPhone bug bounty
Apple now offers security researchers up to $1 million ($893,000) if they find an error in iPhones. That's the...

Broadcom acquires Symantec enterprise security portfolio
Broadcom has announced that it is taking over Symantec's enterprise security division for $10.7 billion ($9.56...