
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

‘VPN connections of Linux distributions vulnerable to hacking’
A new vulnerability has been discovered in Linux, Android, macOS and other Unix-based operating systems. Mali...

McAfee thinks about ‘combination’ with NortonLifeLock
McAfee is considering a merger or partnership of some kind with NortonLifeLock, its direct competitor in the ...

Sophos launches cloud tool to build safer applications
Sophos has made two new innovations available. The biggest innovation is SophosLabs Intelix, a cloud-based to...

AWS launches three new solutions for cloud security
Amazon Web Services yesterday announced three new solutions for cloud security. These are Amazon Detective, I...

ESET has the expertise, but also a central position in Europe
During the recent ESET Press Tour in Bratislava, we received an update about what the security company is cur...

New trojan gives attackers control over Windows systems
A newly discovered trojan focuses on organisations in health care and education. It is a tailor-made, Python-...
Microsoft develops programming language for secure coding
Microsoft is in the process of developing a programming language aimed at ensuring security. The company itse...

‘Attacks aimed at SMEs continue to increase’
G DATA has released a number of predictions for 2020. This includes an increased use of automation in cyberat...

Botnet uses YouTube to mine cryptocurrency
A pre-existing botnet has changed its behaviour by switching to cryptomining. To do this, it uses YouTube as ...

Hackers mine Monero cryptic currency through Docker vulnerability
A group of hackers is scanning the entire Internet to find vulnerabilities in certain systems that use enterp...