
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Malware uses WiFi BSSID to identify victims
The malware authors the WiFi AP MAC address (aka BSSID) to geo-locate the systems they have infected. Malw...

Apple loses iOS copyright infringement lawsuit
The tech giant lost their lawsuit against a small company that built a virtualized version of iOS for securi...

Citrix issues Threat Advisory on DDoS attacks
The attacks are actively targeting Citrix Application Delivery Controllers. Citrix has issued an advisory ...

Cloudflare detects a new type of DDoS, inspired by an acoustic beat
Someone has put a new spin on the good old DDoS attack. This new one is inspired by an acoustic beat, of all ...

Let’s Encrypt temporarily solves problems on older Android phones
Let's Encrypt has found a solution to the problem that older Android smartphones will soon no longer trust so...

Biden says he won’t stand idly by as the US gets hit by cyberattacks
On the issue of the recent attacks on US federal agencies, president-elect Joe Biden has promised tougher res...

Microsoft and McAfee are part of a new Ransomware Task Force
Headlined by Microsoft and McAfee, a group of 19 security firms, non-profits, and tech companies announced pl...

MobileIron protects ‘every endpoint, wherever it is’
Within enterprises, thousands of endpoints often are active at once. Many times, these devices are not identi...

Report: long-standing vulnerabilities threaten 5G Smartphone users
EU agency also issues its own report highlighting threats from 5G. Global cybersecurity firm Positive Tech...

Malicious mobile emulator farms are robbing US and EU banks
IBM Trusteer researchers have uncovered an extensive fraud operation unlike anything anyone has ever seen bef...