
Data breach at Dutch lab even bigger: potentially millions of victims
The data breach at Clinical Diagnostics appears to be even larger than initially thought. The Dutch Populatio...
The data breach at Clinical Diagnostics appears to be even larger than initially thought. The Dutch Populatio...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Microsoft today published a security advisory in which it warns of two applications that have accidentally ins...
Mimecast, provider of e-mail and data security, makes its e-mail security information available for the threat...
A hacker has managed to place code in a popular JavaScript library that steals bitcoin. This is a library that...
Researchers from the Russian antivirus manufacturer Dr. Web have found a new form of malware that steals passw...
Cyber threats are on the increase and are becoming increasingly sophisticated. That's what security company Fo...
Researchers at the Vrije Universiteit in Amsterdam have described in a paper a new variation of the Rowhammer ...
In the run-up to the European Parliament elections, Google will oblige advertisers to first submit an applicat...
The Dropbox red team accidentally discovered a zero day in Apple software. While one of the company's teams wa...
The United States is asking allies in Europe to stop purchasing network equipment from Huawei, China. The hope...
According to security company Trend Micro, Emotet's malware corridor deliberately designed the backbone infras...