
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Bitdefender releases new version of GandCrab decrypter
For the third time, the Bitdefender team, together with the Romanian police and Europol, have released a free ...

Cryptominers found in Microsoft Store
Symantec security researchers have found about eight potentially unwanted applications in the Microsoft Store ...

The Netherlands introduces PSD2 payment directive
The Netherlands is the last member state of the European Union to implement the PSD2 Payment Services Directiv...

Three largest political parties Australia victim of hack attack
With only a few weeks to go before the elections, Australian Prime Minister Scott Morrison has announced that ...

Google Earth accidentally reveals top secret military locations
Google Earth has recently been updated. It appears to have accidentally uncovered a number of secret military ...

Nest forces users to change their password
Nest, a subsidiary of Google, forces various users to reset their passwords. Last Friday The Verge was the fir...

Telecom industry calls for European testing regime for network security
The telecom industry is asking European governments to join mobile operators in setting up a testing regime to...

New hacked databases on the dark web include 93 million accounts
A new batch of databases has been discovered on the dark web that is full of details of hacked accounts. It co...

Short Windows passwords hackable in just a few hours
All NTLM passwords that only count eight characters or less can be cracked in hours without the need for excep...

Hackers infect workstations through two-year-old vulnerability
Hackers successfully use a two-year-old vulnerability in a software package of IT support companies to gain a ...