- October 06, 2021
- Tech
- Data
- Cloud
- Luxembourg
- Security
- Startup
- Development
- Digital
Cyber Attack Trends: Mid-Year Report
2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions.
A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies
Over the past 4 months, over 4,000 organizations globally have been targeted by cyber attacks which aim to infect their networks, steal data and commit fraud. Many of these companies are leading international names in industries such as oil & gas, manufacturing, banking and construction industries – and some have had their defenses breached by the attacks.
BILAN APRES L’ÉVALUATION DE LA SÉCURITÉ DE 100 SOLUTIONS IOT PAR DIGITAL SECURITY
Les évaluations menées par Digital Security sur près de 100 solutions connectées offrent une visibilité inégalée sur la prise en compte des enjeux de cybersécurité par le marché de l’Internet des Objets.
Cisco met en garde contre les cyberattaques du type « destruction de service »
Les récentes cyberattaques à grande vitesse au niveau mondial, telles que WannaCry et Nyetya prennent l’apparence de rançongiciels, mais sont en soi beaucoup plus destructrices. C’est ce que Cisco avance dans son annuel Midyear Cybersecurity Report. Cisco met en garde contre les attaques « destruction of service » (DeOS) qui peuvent également désactiver les sauvegardes des entreprises. Comme elles laissent les entreprises sans possibilité de reprise d’activités, ces attaques DeOS causent davantage de dégâts que les attaques traditionnelles.
Check Point: A Leader in Vision and Execution in Two Gartner Magic Quadrants
Following the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are. What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But still, many continue to add solutions that are focused on detecting attacks rather than preventing them. This approach lets the attackers hit first, and only after the damage has already been done, provide remediation. Instead of sitting on the sideline and watching the next attack occur, we can take action and prevent it before it happens. The technologies already exist, and the architecture is already available. But when it comes to selecting a cyber security solution, how do you decide which is the best and most suitable for your business?
L'Australie lance un projet de loi pour accéder aux données cryptées
Tandis que les dirigeants européens ont mis verbalement les acteurs d'Internet face à leurs responsabilités dans la lutte contre le cyberterrorisme, le gouvernement australien a dévoilé ce vendredi un projet de loi permettant d'accéder aux données cryptées présentes sur WhatsApp et Skype.
How the CopyCat malware infected Android devices around the world
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months.
Une solution intégrée de serrure sans fil SmartIntego SimonsVoss et de contrôle d'accès Axis Communications
Axis Communications s'est associé à SimonsVoss Technologies GmbH pour lancer un système de verrouillage numérique et de contrôle d'accès entièrement intégré et basé sur IP. L'intégration représente une solution de serrure sans fil et de contrôle d'accès avancée et économique, idéale pour remplacer les clés physiques dans les bâtiments.
Telindus lance une nouvelle campagne de sensibilisation à la cybercriminalité en entreprise
Début juillet, Telindus a déployé une nouvelle campagne de sensibilisation à la cybercriminalité auprès des entreprises Luxembourgeoises en leur offrant un kit comprenant tous les outils nécessaires à une communication de sensibilisation interne. Composé d’une infographie, de posters à messages clés, de cartes postales et de stickers, ce kit a pour but d’interpeller sur les risques liés à la cybercriminalité (vol de données, social engineering, phishing, etc.), de faire réfléchir aux bons comportements à adopter pour s’en prémunir et ainsi de contribuer à élever le niveau de sensibilitation à la sécurité de l’écosystème luxembourgeois.
Smart cities: The correlation of cause and effect
The concept of a ‘smart city’ can be seen as a cluster of city improvement plans that address multiple challenges. These can relate to transport, mobility, air quality, noise levels, water management, architectonic barriers, maintenance optimization, street and outdoor lighting, urban development, and other areas. These aspects are ultimately all related to each other – the amount of traffic, for example, has an effect on air quality and noise levels – but with many other factors also thrown in, understanding the exact correlation of cause and effect is a complex task.
Detect threats faster with Cisco StealthWatch
The third Cisco Identity Service Engine (ISE) workshop organised by Dimension Data demonstrated to participants how StealthWatch detects threats, malware infections and significantly limits their cost and downtime impacts on business.
Delivering aerial security through drone monitoring
The use of drones – also known as unmanned aerial vehicles (UAVs) – is becoming ever more widespread across multiple industry sectors. While the majority of users of drones are doing so responsibly, and most applications and uses are having a positive impact, their use isn’t without issues. Because drones can be used as a mobile ‘flying eye’ to deliver video footage or pictures from the sky, they have the potential to be used in corporate espionage or to identify security weaknesses. They can also be used as a mobile and remote delivery tool for illicit goods, or even present a direct attack threat. More innocently – but no less dangerously – drones can present a safety risk when unwittingly flown into airspace where other airborne traffic exists, or to personnel on the ground. As such, organizations need to recognize this new threat, and put in place measures to monitor drones and control them from ground level.