
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

“Cybercriminals abuse encrypted data traffic more often.
Cyber threats are on the increase and are becoming increasingly sophisticated. That's what security company Fo...
Rowhammer attacks can bypass ECC memory protection
Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer ...

Google requires additional verification of political advertisements from 2019 onwards
In the run-up to the European Parliament elections, Google will oblige advertisers to first submit an applicat...

Dropbox researchers accidentally found 3 zero days in Apple software
The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams wa...

U.S. ask allies not to buy network equipment from Huawei
The United States is asking allies in Europe to stop purchasing network equipment from Huawei, China. The hope...
Emotet malware includes unique infrastructure to prevent down-time
According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infras...

U.S. postal service leaks data from 60 million customers due to problem with API
The USPS, the American postal service, has closed a vulnerability that made the data of about 60 million custo...
GroenLinks and VVD don’t want Chinese systems in the police and other emergency services.
As far as GroenLinks and the VVD are concerned, the Netherlands should refrain from plans to purchase Chinese ...

Hackers actively exploit second vulnerability in WordPress plugin
Hackers have been able to exploit a second vulnerability in a commonly used WordPress plugin in just one week....

“Security company identifies hacker selling MySpace and Dropbox databases.
The American security company Recorded Future claims to have discovered the identity of a hacker who was behin...