Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly reports on IT security topics as well as on current innovations and events at Hornetsecurity.

Hornetsecurity Podcast
Formjacking – The New Invisible Threat in Cyberspace

Formjacking – The New Invisible Threat in Cyberspace

Christmas is just around the corner and it is already certain that some people will lose their holiday spirit. When millions of people go online on a gift hunt, the trap snaps shut. We are talking about the new invisible threat on the Internet: Formjacking, also known as e-skimming. Hackers are stealing credit card and bank details from online shops with hijacked payment forms…
The hacker: made in Hollywood?

The hacker: made in Hollywood?

A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…
The age of information: What makes your data so valuable?

The age of information: What makes your data so valuable?

Are you aware of your “data value”? In the case of a data leak in the IT systems of multinational companies, it is often reported that the damage amounts to billions. Data has even become one of the most valuable resources in the world. However, a calculator that allows users to determine the overall value of their data leaves a completely different impression: the “price” for the information provided by users is always less than one dollar. But how is this possible and is it even possible to specifically calculate the value of this “resource”?
Cybercrime – a global risk?

Cybercrime – a global risk?

Cyberattacks are among the top five global threats. That was the finding of the World Economic Forum’s Global Risk Report. But how exactly can cyber attacks affect the physical world? Can hackers really do visible and tangible damage to our world?

Share the article on Twitter, LinkedIn and Co.

Sign Up Hornet News

Cyberthreat Report 2019