
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline
IBM: Destructive malware attacks have doubled since January
The number of destructive malware attacks doubled in the first half of 2019 compared to the second half of 201...

BlackBerry introduces artificial intelligence solution Intelligent Security
BlackBerry has a cloud-based solution that leverages adaptive security, constant authentication, and artificia...

Microsoft launches new Azure Security Lab
Microsoft launched its new Azure Security Lab during the Black Hat conference in Las Vegas. This is intended t...
Windows malware uses proxies to bring in other malware
Researchers at security company Proofpoint have found new malware that focuses on Windows systems. The so-call...

Kaspersky measures double number of fake PC cleaners in research
Researchers from cybersecurity company Kaspersky have discovered that the number of cases of so-called 'hoax s...

Data over 100 million people stolen from large hack American bank
The American bank Capital One has been the victim of a large-scale hack. 33-year-old software engineer Paige T...

Kosmonauts get cybersecurity training from Kaspersky
Kaspersky and the Gagarin Research and Test Cosmonaut Training Center have started a collaboration to train co...

Hackers can steal business secrets through vulnerabilities in popular corporate VPNs
Security researchers Orange Tsai and Meh Chang have found several vulnerabilities in popular business VPN serv...

Fake LinkedIn alerts successful with phishing, research shows
Research by KnowBe4, expert on phishing attacks, shows that the use of LinkedIn in the subject line of phishin...