
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Sensitive data from large companies leaked through Box accounts
Companies that use Box as a cloud-based file hosting and sharing system may accidentally leak their internal f...

Free remedy against BigBobRoss-ransomware available
Avast and Emsisoft provide free decryption software to those affected by the BigBobRoss version of ransomware....

Smart car alarm makes stealing vehicle very easy
A smart car alarm should make it harder to steal a vehicle. However, a new study shows that in some cases, the...
Windows malware Slub abuses Slack and GitHub to steal data
Trend Micro researchers say they found a new malware that uses Slack channels, GitHub, and file.io to steal da...

U.S. state pays $400,000 after ransomware attack
In Jackson County, Georgia, no less than 400,000 dollars (355,624 euros) was paid to cyber criminals. This put...

Thales and Gemalto get antitrust exemption in US
Thales and Gemalto have been granted an antitrust exemption in the United States. Earlier this month, the two ...

798 million e-mail addresses leaked through MongoDB database
Security researchers Bob Diachenko and Vinny Troia have discovered a publicly accessible database owned by an ...

Gemalto expands Cloud HSM On Demand solutions
Gemalto has expanded its Cloud HSM On Demand portfolio with three new solutions. These are HSM On Demand for C...

“The number of cyber-attacks increased by a third in 2018.
The number of cyber attacks worldwide has quadrupled in the second half of 2018 compared to the first half of ...

Cisco advises Nexus switch owners to disable POAP function
Cisco has advised owners of Nexus switches to disable a feature called PowerOn Auto Provisioning (POAP) for se...