The education sector suffers from the highest data encryption rate and the longest recovery time worldwide.
Security
Sicherheitsfunksystem Polycom: Rollout erneut verschoben
Weiter anhaltende Lieferprobleme bei Atos - Bundesamt für Bevölkerungsschutz kündigt Freigabe des generalüberholten Sicherheitsfunks jetzt für Oktober an.
All on Board: How Employees Become an Active Part of IT Security
Security awareness trainings sensitise the entire team to phishing, ransomware and secure remote working.
Cybercrime Costs Companies $1.79 Million Per Minute
RiskIQ has conducted a study on the financial scope of malicious activity on the Internet.
Lockdown Mode: Apple Presents Security Function For “Vulnerable” Persons
Lockdown Mode is designed to protect users from government hacking attacks. Mode restricts certain functions such as receiving file attachments and Facetime calls.
Phishing Attack On Facebook Messenger Steals Millions Of Credentials
Group uses technique to bypass blocking of their URLS. Huge growth in phishing attacks compared to 2022.
Cloudbasierte physische Sicherheit wichtiges Element der Digitalisierungsagenda
Leitfaden für Reseller wie sich Sicherheits- und Business-Intelligence-Vorteile erschließen und Kostensteigerungen vermindern lassen.
Safety Solutions For Connected Vehicles
Trend Micro founds subsidiary for more cyber security in the automotive sector.
Hessian Energy Supplier Reports “Criminal Hacker Attack”
The target is a subsidiary of Darmstadt-based energy supplier Entega. The hackers bring the company's website and e-mail system to a standstill. The Mainz municipal utility is also affected.
Cyber Attacks On Industrial Plants Cost Companies Millions
On average, the attacks caused damage of 2.9 million euros.
Quick Clicks with Dire Consequences
Spear phishing attackers use psychological tricks to entice their victims to quickly click on fraudulent mails, warns David Kelm of IT-Seals.
IT Security Risks In The Home Office
For many employees, being able to work at home on a computer is an advantage. However, remote working does not make IT security any easier.
Watch Out in the Home Office: Voice Assistant Listens In
Voice assistants are practical, but in the home office they pose risks in terms of security and data protection, warns the R+V Versicherung Infocenter.
The 10 Most Common Attack Vectors for Network Intrusion
Recommendation issued jointly by the U.S., Canada, New Zealand, Netherlands and the U.K. provides guidance on mitigating vulnerabilities.
Emotet Conquers the Malware Top Position
Number of threats detected from malicious Emotet spam campaigns rises 27 per cent.
Mozilla: Mental Health Apps Fail at User Security
25 out of 32 apps examined do not even meet the minimum standards. Mozilla rates only two apps as good. Researchers call it the worst product category they've studied so far.
Report: How Security Ratings Can Help In The Supply Chain
Companies should know the security status of suppliers in the supply chain. But the assessment is complex. Security ratings as a service can provide support. An overview.
Account Takeover: Identity Theft With Serious Consequences
Perpetrators break into bank or e-commerce accounts through targeted phishing, malware or man-in-the-middle attacks.
Fighting Fraud In Financial Services
Intel, FiVerity and Fortanix to jointly develop AI-powered fraud detection platform.
Hackers can ‘crack’ our password in half a minute
Cybercriminals are capable of revealing any password of fewer than 8 characters in just half a minute. How can we avoid it?
FBI: BlackCat Ransomware Has Successfully Penetrated IT Systems At Least 60 Times Worldwide
BlackCat executable ransomware is highly customizable and supports a number of encryption methods.
Phishing Attacks To Increase Fourfold In 2021
Zscaler's annual ThreatLabz report finds phishing-as-a-service to be the reason for the cross-industry increase in attacks worldwide.
Two Thirds Of German Companies Affected By Ransomware
Sophos study "State of Ransomware 2022″ shows: The average ransom paid in Germany has almost doubled.
Cyber Attacks: The First Minutes Are Crucial
In the defence against cyber attacks, time is both an enemy and an ally. A guest article by Moritz Mann from Open Systems.
Fraud Schemes When Shopping on Online Platforms
Sensitive payment and login details are carelessly disclosed and transactions authorised.
The Danger Of Weak And Insecure Passwords Is Growing
Password hygiene is important. Since attacks often start by manipulating employees, insecure passwords are a gateway for hackers.
Cyber Criminals Are Increasingly Targeting Industrial Companies
Malicious cyber attackers pose serious threat to Europe's industrial infrastructure.
Microsoft Updates Windows 11 For Greater Productivity, Management Capacity And Security
New features include phishing and targeted malware protection through Microsoft Defender SmartScreen and Smart App Control
No Strategy to Defend Against Insider Threats
Insider threats have caused 59 per cent of data security incidents in the past twelve months.
30% Of Users Have Never Backed Up Before
Out of those who do back up, 10 % do so daily, 33 % take 1 to 2 months between backups and 10 % do so once a year. 17% make backups only if they change cell phones.