Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly reports on IT security topics as well as on current innovations and events at Hornetsecurity.
It Can Wait Till Next Year…
How many times have you said that or heard that in the office environment? Probably more often than you care to admit. When that statement is made it usually applies to the costs associated with initiatives that sit on the budget bubble. These items or initiatives...
Critical infrastructures – probably the most vulnerable point of a country
The Federal Office for Information Security registered a significant increase in hacker attacks on operators of critical infrastructures this year. What consequences can we expect and how do cybercriminals proceed when attacking?
Industry 4.0 – how secure is the production of the future?
Transparency, speed and resource-saving: Industry 4.0 promises all this. But converting to a Smart Factory presents companies with many challenges with regard to the networked infrastructure and its security. Cybercriminals know about possible weak points – what are possible scenarios and how do hackers get into the system?
Hornetsecurity releases new feature for protection against encrypted malware attachments
With Malicious Document Decryption, Hornetsecurity developed a unique feature that counteracts the currently increasing threat posed by malicious encrypted email attachments.
The future of encryption technology? Quantum computers and post-quantum cryptography explained
A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.
Mirai – The Botnet of Things
In October 2016, the Mirai botnet became widely known for the first time: the largest DDoS attack ever launched on the DNS provider “Dyn” shuts down Amazon and Netflix for several hours. The botnet consisted of hacked smart devices – an enormous security vulnerability in the Internet of Things was revealed. What does this mean for digitization in companies? And who exactly is behind the dangerous IoT virus Mirai?
Crypto mining – From the gold rush in the digital world
Crypto currencies have established as a legitimate means of payment in the digital world. However, “mining” these currencies involves a great deal of effort – cybercriminals have developed methods to illegally gain access to the new gold. Especially companies are at the mercy…We examine the mining of modern times and clarify the most important questions.
Internet of Things: More time for security in the era of innovation
In 1999 the British technology pioneer Kevin Ashton used the term Internet of Things for the first time – today there are about 10 billion connected devices worldwide. More and more smart devices are entering the market, one even more innovative than the other. But does all the progress mean that safety will fall by the wayside?