We’re available from 9 am to 6 pm on weekdays. Contact Us.
Security

Cisco met en garde contre les cyberattaques du type « destruction de service »

Les récentes cyberattaques à grande vitesse au niveau mondial, telles que WannaCry et Nyetya prennent l’apparence de rançongiciels, mais sont en soi beaucoup plus destructrices. C’est ce que Cisco avance dans son annuel Midyear Cybersecurity Report. Cisco met en garde contre les attaques « destruction of service » (DeOS) qui peuvent également désactiver les sauvegardes des entreprises. Comme elles laissent les entreprises sans possibilité de reprise d’activités, ces attaques DeOS causent davantage de dégâts que les attaques traditionnelles.

Security

Check Point: A Leader in Vision and Execution in Two Gartner Magic Quadrants

Following the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are.  What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But still, many continue to add solutions that are focused on detecting attacks rather than preventing them. This approach lets the attackers hit first, and only after the damage has already been done, provide remediation. Instead of sitting on the sideline and watching the next attack occur, we can take action and prevent it before it happens.  The technologies already exist, and the architecture is already available. But when it comes to selecting a cyber security solution, how do you decide which is the best and most suitable for your business?

Security

L'Australie lance un projet de loi pour accéder aux données cryptées

Tandis que les dirigeants européens ont mis verbalement les acteurs d'Internet face à leurs responsabilités dans la lutte contre le cyberterrorisme, le gouvernement australien a dévoilé ce vendredi un projet de loi permettant d'accéder aux données cryptées présentes sur WhatsApp et Skype.

Security

How the CopyCat malware infected Android devices around the world

Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months.

Security

Une solution intégrée de serrure sans fil SmartIntego SimonsVoss et de contrôle d'accès Axis Communications

Axis Communications s'est associé à SimonsVoss Technologies GmbH pour lancer un système de verrouillage numérique et de contrôle d'accès entièrement intégré et basé sur IP. L'intégration représente une solution de serrure sans fil et de contrôle d'accès avancée et économique, idéale pour remplacer les clés physiques dans les bâtiments.

Security

Telindus lance une nouvelle campagne de sensibilisation à la cybercriminalité en entreprise

Début juillet, Telindus a déployé une nouvelle campagne de sensibilisation à la cybercriminalité auprès des entreprises Luxembourgeoises en leur offrant un kit comprenant tous les outils nécessaires à une communication de sensibilisation interne. Composé d’une infographie, de posters à messages clés, de cartes postales et de stickers, ce kit a pour but d’interpeller sur les risques liés à la cybercriminalité (vol de données, social engineering, phishing, etc.), de faire réfléchir aux bons comportements à adopter pour s’en prémunir et ainsi de contribuer à élever le niveau de sensibilitation à la sécurité de l’écosystème luxembourgeois.

Security

Smart cities: The correlation of cause and effect

The concept of a ‘smart city’ can be seen as a cluster of city improvement plans that address multiple challenges. These can relate to transport, mobility, air quality, noise levels, water management, architectonic barriers, maintenance optimization, street and outdoor lighting, urban development, and other areas. These aspects are ultimately all related to each other – the amount of traffic, for example, has an effect on air quality and noise levels – but with many other factors also thrown in, understanding the exact correlation of cause and effect is a complex task.

Security

Detect threats faster with Cisco StealthWatch

The third Cisco Identity Service Engine (ISE) workshop organised by Dimension Data demonstrated to participants how StealthWatch detects threats, malware infections and significantly limits their cost and downtime impacts on business.

Security

Delivering aerial security through drone monitoring

The use of drones – also known as unmanned aerial vehicles (UAVs) – is becoming ever more widespread across multiple industry sectors. While the majority of users of drones are doing so responsibly, and most applications and uses are having a positive impact, their use isn’t without issues. Because drones can be used as a mobile ‘flying eye’ to deliver video footage or pictures from the sky, they have the potential to be used in corporate espionage or to identify security weaknesses. They can also be used as a mobile and remote delivery tool for illicit goods, or even present a direct attack threat. More innocently – but no less dangerously – drones can present a safety risk when unwittingly flown into airspace where other airborne traffic exists, or to personnel on the ground. As such, organizations need to recognize this new threat, and put in place measures to monitor drones and control them from ground level.

Security

From WannaCry to WannaKnow?

By Rudolph Bos, Head of Enterprise & Cyber Security Benelux, Fujitsu. WannaCry, the most recent malware hype, has not been very lucrative and it hasn’t even had half the impact it could have had if the malware authors had designed their product and planned their actions a bit more professionally. Nevertheless, it was enough to create a worldwide panic attack which has led to equally unprofessional behavior.

Security

Fireball and WannaCry Impact More Than 1 in 4 Organizations Globally

Check Point® Software Technologies Ltd. (NASDAQ: CHKP) has revealed that more than one in four organizations globally was affected by the Fireball or WannaCry attacks during May, in the company’s latest Global Threat Impact Index. 

Security

Chain Reaction: The New Wave of Mobile Attacks

The main purpose of any business is to grow and be more successful – and that applies to criminal organizations just as much as it does to legitimate companies.  Cybercriminals have found that attacks specifically targeting smartphones and tablets, particularly those that incorporate a ransomware payload, are effective and profitable – which is why the volume of malware targeting users of mobile devices trebled during 2015.