IT Security Information

Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.

The hacker: made in Hollywood?

The hacker: made in Hollywood?

A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…
The age of information: What makes your data so valuable?

The age of information: What makes your data so valuable?

Are you aware of your “data value”? In the case of a data leak in the IT systems of multinational companies, it is often reported that the damage amounts to billions. Data has even become one of the most valuable resources in the world. However, a calculator that allows users to determine the overall value of their data leaves a completely different impression: the “price” for the information provided by users is always less than one dollar. But how is this possible and is it even possible to specifically calculate the value of this “resource”?
Cybercrime – a global risk?

Cybercrime – a global risk?

Cyberattacks are among the top five global threats. That was the finding of the World Economic Forum’s Global Risk Report. But how exactly can cyber attacks affect the physical world? Can hackers really do visible and tangible damage to our world?
It Can Wait Till Next Year…

It Can Wait Till Next Year…

How many times have you said that or heard that in the office environment? Probably more often than you care to admit. When that statement is made it usually applies to the costs associated with initiatives that sit on the budget bubble. These items or initiatives...

Industry 4.0 – how secure is the production of the future?

Industry 4.0 – how secure is the production of the future?

Transparency, speed and resource-saving: Industry 4.0 promises all this. But converting to a Smart Factory presents companies with many challenges with regard to the networked infrastructure and its security. Cybercriminals know about possible weak points – what are possible scenarios and how do hackers get into the system?
The future of encryption technology? Quantum computers and post-quantum cryptography explained

The future of encryption technology? Quantum computers and post-quantum cryptography explained

A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.

Share the article on Twitter, LinkedIn and Co.

Sign Up Hornet News

Cyberthreat Report 2019