IT Security Information
Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.
Transparency, speed and resource-saving: Industry 4.0 promises all this. But converting to a Smart Factory presents companies with many challenges with regard to the networked infrastructure and its security. Cybercriminals know about possible weak points – what are possible scenarios and how do hackers get into the system?
A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.
In October 2016, the Mirai botnet became widely known for the first time: the largest DDoS attack ever launched on the DNS provider “Dyn” shuts down Amazon and Netflix for several hours. The botnet consisted of hacked smart devices – an enormous security vulnerability in the Internet of Things was revealed. What does this mean for digitization in companies? And who exactly is behind the dangerous IoT virus Mirai?
Crypto currencies have established as a legitimate means of payment in the digital world. However, “mining” these currencies involves a great deal of effort – cybercriminals have developed methods to illegally gain access to the new gold. Especially companies are at the mercy…We examine the mining of modern times and clarify the most important questions.
In 1999 the British technology pioneer Kevin Ashton used the term Internet of Things for the first time – today there are about 10 billion connected devices worldwide. More and more smart devices are entering the market, one even more innovative than the other. But does all the progress mean that safety will fall by the wayside?
In her article “AI – the same procedures as last century?” our Head of Product Management Dr. Yvonne Bernard takes a look behind the current hype about artificial intelligence. Now we want to learn more about the implementation of artificial intelligence in an entrepreneurial context.
The long-awaited Reverse Engineering Tool of the US Secret Service (NSA) was presented at the RSA Conference on March 5th. Our Head of Product Management Dr. Yvonne Bernard was live at the event and describes her impressions of the “Open Source Software”.
Even with sufficient technical security measures, there is always a vulnerability in the company that can be exploited by hackers: The human.