Anyone who wants to defend himself successfully against cyber criminals must know their procedures. Dell Technologies takes the current European Cyber Security Month (ESCM) as an opportunity to explain seven common methods. Hackers
BSI warns against the use of Kaspersky virus protection products
According to Section 7 of the BSI Act, the Federal Office for Information Security (BSI) warns against the use of virus protection software from the Russian manufacturer Kaspersky. The BSI recommends replacing applications from Kaspersky's virus…
READ MORETrojans as malicious programs on the rise
Check Point Research released the new results of the Global Threat Index for September 2019. At the moment, the recently discovered pest Agent Tesla is marching to first place.
READ MORESeven typical entry points for hackers
Anyone who wants to defend himself successfully against cyber criminals must know their procedures. Dell Technologies takes the current European Cyber Security Month (ESCM) as an opportunity to explain seven common methods. Hackers
READ MORECloud solutions - full control over data is mandatory
Cloud services are becoming increasingly popular with German companies: According to Statista, in the year 2018, cloud services are already deploying 73 percent. According to Bitkom Research, half of German companies also store personal data in the…
READ MOREHuge rise in email attacks on businesses
Mimecast's latest ESRA report shows that millions of spam emails, tens of thousands of BEC counterfeit identity attacks, and many dangerous types of files and malware attachments end up in users' inboxes.
READ MOREGitHub sponsors announced as beta
With GitHub Sponsors, there will be an opportunity within the open source community to provide financial support to developers. The "donation program" is currently still in the beta phase and should run free of charge.
READ MOREAzure Shared Image Gallery available
Microsoft has announced the availability of the Azure Shared Image Gallery. Virtual machine system images can be centrally managed and shared globally in the Azure cloud.
READ MOREUS block exports for Chinese supercomputers
The Trump administration has imposed another export stop: The Chinese supercomputer manufacturer Sugon may no longer be supplied with hardware, also the Thatic called joint venture of AMD and a university in Wuxi are subject to the trade embargo.
READ MOREEclipse wants to bring open source thinking to the IoT
The Eclipse Foundation aims to promote commercial use of the Internet of Things. Open source technologies will emerge from the Eclipse IoT initiative and the Eclipse IoT Working Group.
READ MOREThree tips to protect against insider threats
SolarWinds' latest cybersecurity study has found that internal user errors accounted for by far the largest percentage of cybersecurity incidents at 80 percent in the last 12 months.
READ MOREQuantum computers question IT security
Quantum computers are able to undermine today's proven encryption methods - and thus one of the cornerstones of securing networked environments. In the future, the asymmetric encryption methods that are now considered secure will be able to be…
READ MORE"Reductor" malware intervenes in secure HTTPS traffic
Researchers have discovered "Reductor", a new malware that interferes with victims' interactions with HTTPS Web pages by manipulating the pseudo-random number generator that creates encrypted communication between the user and the Web site.
READ MOREData in the cloud only insufficiently protected
A new global study by Thales surveyed by the Ponemon Institute reveals a widening gap between the rapid growth of data stored in the cloud and cloud security efforts.
READ MORERAM manufacturers want to use EUV in 2019
Already in the second half of the year, the first memory chips with extreme ultraviolet exposure (EUV) are to be produced in the 10 nm class process. The first is Samsung, followed by Micron and SK Hynix.
READ MORELenovo offers laptops with preinstalled Linux
Some of Lenovo's upcoming mobile workstations can be ordered with a preinstalled Ubuntu 18.04. The offer clearly targets developers.
READ MORESeven typical entry points for hackers
Anyone who wants to defend himself successfully against cyber criminals must know their procedures. Dell Technologies takes the current European Cyber Security Month (ESCM) as an opportunity to explain seven common methods. Hackers