
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

European Council wants ‘master key’ for encrypted messages
The European Council of Ministers is working on a proposal that would oblige chat applications such as WhatsA...

Many websites will soon stop working on older Android phones
Android phones with Android 7.1.1 or older will soon be unable to reach many websites. This applies to websit...
McAfee says more than 400 new cyber threats were detected every minute in Q2
In 2020’s second quarter, there were more than 400 new cybersecurity threats recorded every minute, accordi...

Update for iOS fixes actively exploited zero-days
In an update for iOS, Apple fixes three zero-day vulnerabilities that were being actively exploited. The leak...

A spike in Emotet activity means the ransomware gang is not far behind
Emotet attacks have been on the rise, leading to more machines getting compromised. This has prompted cybercr...

Collection of thousands of hacked databases leaks
A collection of more than 23,000 hacked databases has temporarily appeared on a forum. The collection came fr...

Fortinet claims a significant speed increase in new firewall
Fortinet has announced a new firewall. The FortiGate 2600F is built for security-driven networking and, accor...

Google provides patches for two Chrome Zero-Days under active exploit
Google has patched two zero-day vulnerabilities in the Chrome browser. This is the third time in two weeks th...

‘NAT Slipstreaming’ Allows Attackers to Remotely Bypass Firewall
Attackers can remotely access any TCP/UDP service bound to a victim machine just by the victim visiting a we...

Citrix reveals new security offerings
Citrix has announced two new products to help companies secure their cloud-based applications. Secure Interne...