Local Laws Start to Fragment Privacy Picture
For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data.
37% of all companies were victims of ransomware attacks in 2021. Malware attacks, phishing attempts, DNS vulnerabilities and other methods of digital data theft can cause reputation damage as well as significant financial costs to businesses, especially given the higher risk of increased remote working. IT managers need to be on their guard and take these and other security threats seriously to ensure secure communication throughout their organization and deliver business continuity. Read about the latest news and developments in cybercrime.
Local Laws Start to Fragment Privacy Picture
For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data.
Urgent, Important or Both: Setting Priorities in IT Security
The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of equilibrium than is actually the case.
The Enemy Camped in Your Server
Last week got off to a sensational start with reports of custom chips discovered in Supermicro serverboards that were designed to smuggle malware into companies. Apple, Amazon and dozens of other top companies are claimed to be affected.
Security risk through USB cable attacks
USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily become obsolete since the introduction of the USB standard.
IT Security Costs Money, no IT Security Costs More Money
British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data breach. This allegedly includes not only the credit card numbers but also the ...
Tiny loopholes that can wreak havoc
Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any information about the result of the pentest.
Beitrag einsenden
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.