IT Security

Samsung Galaxy S10, Xiaomi Mi9 at Pwn2Own Error Hunters

Pwn2Own Tokyo 2019 has come to a close and hunters win a total of $120,000 for demonstration exploits on Samsung Galaxy S10 and Xiaomi Mi9 phones and AC1750 routers on the second day of the competition. Four of the seven hacking attempts planned for the second day were a complete success. The Fluoroacetate team’s Amat

[ Read More ]

Misuse of Austrian Postal Services for Customer Data

Austria’s Postal Service has been fined EUR 18 million (20 million dollars) for working out information on the political allegiances of its customers, said the Ministry of Justice on Tuesday. In January, Austrian Post stated that a database of about 2,2 million customers ‘ likely political affinities would be deleted after privacy campaigners had likened

[ Read More ]

Alternative Secure Email Infra For The Enterprise

Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware

[ Read More ]

The Forgotten IT Security Aspects Of Healthcare Firms

The Healthcare sector’s continued problem with cybersecurity vulnerabilities will continue for many years to come. As long as their equipment follows the principle of “use it until it physically breaks down.” In the world of IT, such a process does not work from the standpoint of security and privacy, especially in the aspect of the

[ Read More ]

Safely Dealing With Network Security In The Age of BYOD

The introduction of telework that allows people to work from outside the office using PCs and smartphones is also in progress. If telecommuting spreads, employees will be able to spend time commuting to work. In addition, you can flexibly work according to personal circumstances, such as being able to work while raising children and taking

[ Read More ]

Timid Cloud-Infrastructure Adaptation Is A Risky

Today’s use of the cloud infrastructure in the enterprise is advancing and adoption is accelerating, but we still hear opposition to it, with claims that making cloud-computing the centerpiece of the firm’s computing dependence is a huge security concern. On the other hand, it is also true that there is a big advantage such as

[ Read More ]

The IT Security Challenges All Small Businesses Face

The world’s rapidly increasing cyber attacks do not know where to stay and are evolving their attack methods on a daily basis. Many companies regardless of size are good prey for attackers. The impact of cyber attacks continues to increase, regardless of the size of the company or organization. Most people will think security measures

[ Read More ]

Firm’s Convenience VS Security, A Free Choice

As we have emphasized in this website many times in the past, security and convenience are two opposing principles when it comes to the digital lifestyle of an individual or a business entity. Each time convenience becomes the focus for an entity, the natural side-effect of a wider attack surface is the result. The measure

[ Read More ]