IT Security Information
Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.
A successful start into the new year: Hornetsecurity completes the acquisition of the British distribution partner and email security provider EveryCloud. Since 2009, EveryCloud has sold the services of the German market leader for cloud security solutions exclusively under its own branding in the UK and later also in the USA.
With the adoption of the DSGVO, the European government has found data to be particularly worth protecting and has drawn the attention of consumers to the importance of this protection. But is personal information treated just as sensitively across European borders as it is in Germany? Where are the differences?
Just in time for the end of the year, the number of attacks with the most dangerous malware in the world – Emotet – is rising. The experts from the Hornetsecurity Security Lab have been able to observe a particularly striking campaign since December 19.
You cannot turn on the news without hearing about it, and you cannot show up to work without being warned about it. Ransomware has dominated the public conversation on cyber security, and hackers have spent the year exploiting companies for billions with the tactic. Email has become the number one attack vector, and ransomware has become any employees worst enemy.
Christmas is just around the corner and it is already certain that some people will lose their holiday spirit. When millions of people go online on a gift hunt, the trap snaps shut. We are talking about the new invisible threat on the Internet: Formjacking, also known as e-skimming. Hackers are stealing credit card and bank details from online shops with hijacked payment forms…
A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…
Are you aware of your “data value”? In the case of a data leak in the IT systems of multinational companies, it is often reported that the damage amounts to billions. Data has even become one of the most valuable resources in the world. However, a calculator that allows users to determine the overall value of their data leaves a completely different impression: the “price” for the information provided by users is always less than one dollar. But how is this possible and is it even possible to specifically calculate the value of this “resource”?
Cyberattacks no longer aim only at large corporations in industry, but are also increasingly affecting institutions in the healthcare sector. The consequences of a cyberattack on hospitals can be life-threatening for patients.