Facebook iconTwitter icon
B2B-Network:
Latest Articles
News
Meltdown & Spectre: The Two Bugs that Can Penetrate Your Processor
Thumb sicherheitslu%cc%88cke

Processors are designed to protect the most sensitive memory part of billions of computers. So what happens, if the processor can no longer accomplish this task? Recent research conducted by Google's Project Zero Team indicates that two primary flaws are affecting modern computers running on Intel, AMD, and ARM processors.

The flaws which are now referred to as Meltdown and Spectre work by isolating untrusted computer programs from accessing some processes on the device or the deep layers of the OS where sensitive information is stored. Hackers are only required to run a certain...

» Read more
Comment
The case on Net Neutrality
Thumb netz

Net neutrality, which was designed by the Obama administration as a means to safeguard the internet, has been scrapped by the Federal Communications commission. While it will take weeks to take effect, the decision has not been welcomed by many. Various organisations and big companies such as Google and Facebook are even threating to file legal action.

 

What is net neutrality?

These were a set of regulations that prohibited internet service providers from blocking websites or charging different prices to different content providers. They were meant to ensure strong oversight in the...

» Read more
Studie
Cyber Crime is costing enterprises more and more money
Thumb verknu%cc%88pft

In the course of the most recent two years, the expenses due to cyber crime have increased: The new Cost of Cyber Crime Study by Accenture and the Ponemon Institute implies that costs are 23 percent higher than last year and summing up to US$11.7 million. In this number are included the costs for cyber security measurments and the time spent for business recovery in case of an attack. However, current spending is somewhat misled as it fails to prevent data breaches and hacks.
 

Certain branches are more often targeted than others

Nearby, the...

» Read more
Comment
Why The Shadow Brokers are Causing More Damage than Snowden
Thumb shadow

It could be the largest security breach the N.S.A. has faced since the infamous Edward Snowden case. In fact, many experts say the damage caused by the Shadow Brokers far exceeds that caused by the earlier disclosures of sensitive data made by Snowden. 
 

What do qe know about the Shadow Brokers?

While the identity of this group and their true intentions are shrouded in mystery, we do know some facts about their activity. They are a group of hackers who first manifested their existence in the summer of 2016, by publishing a set of hacking tools and exploits which had been...

» Read more
Analysis
Multi factor Authentication Fights Back Against Hackers
Thumb fingerabdruck

Multifactor Authentication (or MFA for short) is a security method that uses more than one type of authentication to check a user’s identity when logging in or completing a transaction. The goal is to build several layers of defense against hackers trying to gain access to accounts, computers, networks, or databases. 
 

What is MFA?

MFA uses a combination of two or more independent methods of checking identity. These include something a user knows, something they physically have in their possession or a physical trait they possess. If a hacker defeats one of these checks,...

» Read more
Practical Advice
4 Measurements to protect your business from ransomware attacks
Thumb ransomware3

Ransomware has been a dangerous threat to many small and large businesses for over six years now. Unfortunately, this type of cybercrime isn’t going away, but it can be prevented. Here are some tips on how you can protect your business from ransomware attacks. 

 

1. Update your computer system regularly

Cyber criminals usually find it easier to attack older versions of operating systems and browsers. However, if you keep all your business computers constantly updated, hackers will be less prepared to attack them as they won’t be able to figure out how to compromise the...

» Read more
News
The UK Goes Toe-to-toe with WhatsApp and Europe Over Encryption
Thumb encryption

There is a face-off between WhatsApp and the UK government happening right now, and the world is watching. 

Frictions surround the use by the Facebook-owned messaging and voice software of end-to-end encryption that makes data impossible to intercept. Communications between criminals or extremists on the system (and similar digital platforms) cannot be monitored, a source of frustration for government. The UK Home Secretary, Amber Rudd, has asked WhatsApp to help them gain this kind of access. The government has the Investigatory Powers Act (also known as the Snoopers...

» Read more
Studie
The Cloud-Based Skills Gap: Keeping Pace with a Changing Environment
Thumb serverwartung

Cloud-based computing is normally associated with increased in-house efficiency, superior levels of redundancy and more efficient approaches to IT-based tasks. Unfortunately, this appears to be more of a myth than a reality. Recent research has found that a lack of the appropriate skills is dramatically impacting the potential ROI associated with such systems. Not only can this have a debilitating effect upon day-to-day operations, but this so-called skills gap is also making it difficult for organisations to leverage the power of the cloud to their advantage. What have statistics shown?

...

» Read more
Trend
Understanding Fileless Malware Attacks
Thumb malware

Cybersecurity faces new and advanced threats every day. The complex nature of technology keeps changing hence making itself vulnerable to errors and attacks. Hackers are using this to create new malware programs that can infect the systems without detection. These are known as fileless malware.
 

What is a fileless malware and how does it work?

Fileless malware uses a set of techniques to get into your system without a trace. It does not use any files to attack your systems. Therefore, attackers choose these malware programs to infect the hard drive to avoid detection through signature...

» Read more
Practical Advise
Is Your Business Ready To Fend Off a DDOS Attack?
Thumb attacke

Hackers in the 21st century are getting ever more devious and accomplished, particularly in the field of Distributed Denial of Service attacks (DDoS). The attacks are increasing both in size and effect they have on businesses, and it is a gruelling affair to cope with them. 

But a company that ignores the threat is betting with its very livelihood. They can happen anywhere, at any time. 
 

Protecting Your Business From a DDOS Attack

The capacity of your system is the tipping point for a DDoS attack. As an interim manoeuvre it can pay to provision for extra capacity in...

» Read more

<< Older posts
Loader