
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

USB-IF comes with USB-C solution for protection against malicious devices
The USB Implementers Forum (USB-IF) has announced the launch of its USB Type-C Authentication Program. The spe...

Hackers threaten to publish insurance documents from 9/11
A hacker group called The Dark Overlord announced Monday that it had hacked into a law firm. This law firm han...

Hacker finds zero-day to overwrite files in Windows 10
A hacker has found a new way to break into the Windows 10 app security model. SandboxEscaper, who has been abl...

Ransomware flattens networks of several major American newspapers
Last weekend, the printing works and deliveries of several large American newspapers came to a standstill. Thi...

Urgent update of Internet Explorer disables certain Lenovo laptops
A few days ago, Microsoft released a rush update for Internet Explorer. That patch ensured that a zero day vul...

New Google Chrome attack can cause your Windows 10 device to crash
A new exploit has been discovered within Google Chrome, which has the potential to completely freeze Windows 1...

Chrome OS now blocks hacks via USB devices
Chrome OS will soon block all attempts to access a device via a USB device, or to change settings when the scr...

Hackers find simple method to bypass two-stage verification
Hackers have found a new way to bypass two-stage verification. The hackers have succeeded in automating this p...

“China hacked into HPE, IBM and their customers’ networks.
Sources from the Reuters news agency claim that hackers working for the Chinese Ministry of State Security hav...