Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly reports on IT security topics as well as on current innovations and events at Hornetsecurity.

Hornetsecurity Podcast
It Can Wait Till Next Year…

It Can Wait Till Next Year…

How many times have you said that or heard that in the office environment? Probably more often than you care to admit. When that statement is made it usually applies to the costs associated with initiatives that sit on the budget bubble. These items or initiatives...

The future of encryption technology? Quantum computers and post-quantum cryptography explained

The future of encryption technology? Quantum computers and post-quantum cryptography explained

A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.
Mirai – The Botnet of Things

Mirai – The Botnet of Things

In October 2016, the Mirai botnet became widely known for the first time: the largest DDoS attack ever launched on the DNS provider “Dyn” shuts down Amazon and Netflix for several hours. The botnet consisted of hacked smart devices – an enormous security vulnerability in the Internet of Things was revealed. What does this mean for digitization in companies? And who exactly is behind the dangerous IoT virus Mirai?
Crypto mining – From the gold rush in the digital world

Crypto mining – From the gold rush in the digital world

Crypto currencies have established as a legitimate means of payment in the digital world. However, “mining” these currencies involves a great deal of effort – cybercriminals have developed methods to illegally gain access to the new gold. Especially companies are at the mercy…We examine the mining of modern times and clarify the most important questions.

Share the article on Twitter, LinkedIn and Co.

Sign Up Hornet News

Cyberthreat Report 2019