Tag: Security

Here you will find all the articles with the tag: Security.

Email attacks are source of stress for security professionals

Email attacks are source of stress for security professionals

Security professionals in Europe experience a high workload due to e-mail attacks. Investigating their fraudulent nature takes a long time. 7 percent of EU security teams receive more than 50 suspicious emails a day, while 32 percent receive between 6 and 50 of these emails every day. Barracuda... Read more

date4 years ago
F5 Networks acquires Shape Security to improve app security

F5 Networks acquires Shape Security to improve app security

F5 Networks, specialist in network traffic management, is taking over Shape Security for approximately 1 billion dollars. That American company is known for its fraud detection platform for airlines, banks, government agencies and retailers. With the acquisition, F5 Networks wants to improve its... Read more

date4 years ago
New ransomware strain encrypts data after stealing it

New ransomware strain encrypts data after stealing it

A ransomware strain from the Zeppelin group can steal data and then encrypt it. Many forms of ransomware, only encrypt data, but do not steal it first. Examples include REvil, Maze, and Snatch, which steal the encrypted data first. Zeppelin can also do this now. Cybersecurity firm Morphisec made... Read more

date4 years ago
Google blocks ‘less secure apps’ for G Suite from June 2020

Google blocks ‘less secure apps’ for G Suite from June 2020

Apps that ask for your G Suite account username and password, to sign in directly to your G Suite-account, will no longer be able to access G Suite starting from February 15th, 2021. Google considers apps that use this login method to be 'less secure apps' and will only allow logins with an OAuth t... Read more

date4 years ago
Google unveils framework for cloud-native security

Google unveils framework for cloud-native security

In a new white paper, Google explains how it keeps its cloud-native architecture safe within the organisation. These kinds of whitepapers from Google are interesting, because in the past they have served as a source of inspiration for start-ups and other companies. The new framework was christen... Read more

date4 years ago
Windows vulnerability abused to launch targeted attack

Windows vulnerability abused to launch targeted attack

A new zero-day vulnerability (CVE-2019-1458) in Windows, discovered by antivirus company Kaspersky, has been used during the cyber attack Operation WizardOpium. With this vulnerability, malicious parties can bypass the security mechanisms in Google Chrome. Kaspersky's exploit prevention encounte... Read more

date4 years ago
‘Cyber-attacks occur more and more at the hardware level’

‘Cyber-attacks occur more and more at the hardware level’

Dell EMC warns that hackers are increasingly trying to penetrate at hardware level. That's what ITproportal writes in a report. According to a study by Dell, in 2019 hackers invaded at least two-thirds of all organizations surveyed via a hardware vulnerability. Almost half of them were hit at le... Read more

date4 years ago
Hackers harass residents after taking over Ring cameras

Hackers harass residents after taking over Ring cameras

Instead of being able to see and hear who is at the door, Ring users are being harassed after hackers have gained access to their cameras. In America, several reports have been going around in the last few days from owners of a Ring camera, indicating that strangers can play sound through the sp... Read more

date4 years ago
ISC² provides universal cybersecurity certificates

ISC² provides universal cybersecurity certificates

ISC² presents itself as the largest non-profit cybersecurity membership association in the world. The organisation has more than 140,000 members and provides nine cybersecurity certifications. Techzine recently spoke with the non-profit organisation to find out exactly what role ISC² plays in the... Read more

date4 years ago
Mobile malware wriggling towards top cyber threats

Mobile malware wriggling towards top cyber threats

A rare event, albeit not a positive one: For the first time in three years, a mobile trojan has been able to penetrate the top ten of most threatening malware at this moment. XHelper focuses specifically on Android users. Last month's Global Threat Index features Check Point Software Technologie... Read more

date4 years ago
1 27 28 29 30 31 50