Simply good news!
How many times have you said that or heard that in the office environment? Probably more often than you care to admit. When that statement is made it usually applies to the costs associated with initiatives that sit on the budget bubble. These items or initiatives...
The Federal Office for Information Security registered a significant increase in hacker attacks on operators of critical infrastructures this year. What consequences can we expect and how do cybercriminals proceed when attacking?
Besides Ransomware, Crypto Miner and Spyware, the plain text-based attack method Business email compromise seems very unimpressive. But it is now one of the biggest global cyber threats: According to the FBI, the email fraud has already caused damage of around 12 billion dollars worldwide.
Transparency, speed and resource-saving: Industry 4.0 promises all this. But converting to a Smart Factory presents companies with many challenges with regard to the networked infrastructure and its security. Cybercriminals know about possible weak points – what are possible scenarios and how do hackers get into the system?
With Malicious Document Decryption, Hornetsecurity developed a unique feature that counteracts the currently increasing threat posed by malicious encrypted email attachments.
Hornetsecurity’s Progessive Web App provides easy and fast access to the control panel to view and manage incoming emails. Anytime and anywhere from home or on the road.
Cybercriminals are constantly developing new ways to inject malware into the systems of businesses and organizations and to get around antivirus programs unnoticed. By encrypting email attachments, hackers have been able to bypass some filtering mechanisms. However, the new Malicious Document Decryption feature can look behind the tricky attack technique.
A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.
In October 2016, the Mirai botnet became widely known for the first time: the largest DDoS attack ever launched on the DNS provider “Dyn” shuts down Amazon and Netflix for several hours. The botnet consisted of hacked smart devices – an enormous security vulnerability in the Internet of Things was revealed. What does this mean for digitization in companies? And who exactly is behind the dangerous IoT virus Mirai?
Crypto currencies have established as a legitimate means of payment in the digital world. However, “mining” these currencies involves a great deal of effort – cybercriminals have developed methods to illegally gain access to the new gold. Especially companies are at the mercy…We examine the mining of modern times and clarify the most important questions.
In 1999 the British technology pioneer Kevin Ashton used the term Internet of Things for the first time – today there are about 10 billion connected devices worldwide. More and more smart devices are entering the market, one even more innovative than the other. But does all the progress mean that safety will fall by the wayside?
After its successful premiere in 2018, secIT by Heise has established as an important security event in northern Germany. During qualitative conversations in Experts Talks and lectures by IT experts, visitors were able to get an overview of the current topics in the cyber security industry.
As an expert for email security in the cloud, Hornetsecurity again attended the world’s leading conference and exhibition for information security “RSA” in San Francisco this year. We share our impressions and report about the topics of this year’s event – and are delighted for receiving a very special award.
In her article “AI – the same procedures as last century?” our Head of Product Management Dr. Yvonne Bernard takes a look behind the current hype about artificial intelligence. Now we want to learn more about the implementation of artificial intelligence in an entrepreneurial context.
The long-awaited Reverse Engineering Tool of the US Secret Service (NSA) was presented at the RSA Conference on March 5th. Our Head of Product Management Dr. Yvonne Bernard was live at the event and describes her impressions of the “Open Source Software”.
The Southeast Asian partner InternetNow! of Hornetsecurity celebrated its 20th anniversary on 23 January. Hornetsecuritys Head of Customer Success was part of this special event.
Even with sufficient technical security measures, there is always a vulnerability in the company that can be exploited by hackers: The human.
Malware is an essential tool for cybercriminals. This is now significantly reflected by the rapidly increasing distribution rates.