£120k issued in fines to two companies for predatory marketing campaigns – ICO News
We have fined two companies for making unlawful marketing calls to individuals registered with the Telephone Preference Service (TPS). – Read More
We have fined two companies for making unlawful marketing calls to individuals registered with the Telephone Preference Service (TPS). – Read More
Just when it seemed like the dust was beginning to settle, the Star Health data breach took a dramatic and shocking turn. According to claims from the hacker behind the…
Justice Marcus Smith reprimanded in August A High Court judge, who was reprimanded for sending a love letter to a junior colleague, is stepping down from his role as president…
Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode obfuscation techniques to conceal a skimmer dubbed Mongolian Skimmer. “At first glance, the thing that stood…
What is cyber insurance? Cyber insurance, also known as cyber risk insurance or cyber liability insurance coverage (CLIC), is an insurance policy that helps cover costs associated with data breaches…
Intrusion detection and prevention systems (IDPS) Detecting and preventing network intrusions used to be the bread and butter of IT security. But over the past few years, analysts and defenders…
Samsung Knox Native ist jetzt hierzulande erhältlich. Es soll die mobile Kommunikation sicherer machen. PeopleImages.com – Yuri A – shutterstock.com Mit Samsung Knox Native offeriert der koreanische Hersteller nun hierzulande…
The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a Secure by Design alert in September urging tech manufacturers to remove cross-site scripting…
EDR- und XDR-Systeme bieten umfassende Sicherheit und Transparenz für alle Endpunkte und Netzwerke in Ihrer IT-Infrastruktur. ArtemisDiana – shutterstock.com Die jüngsten Diskussionen um Crowdstrike und ähnliche Anbieter haben die Aufmerksamkeit…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.…
University of College | shutterstock.com Hartkodierte Zugangsdaten im Quellcode der Asset-Management- und IT-Ticketing-Software “Web Help Desk” haben den IT-Dienstleister Solarwinds dazu veranlasst, einen Hotfix zu veröffentlichen. Nicht-autorisierte Angreifer, die diese…
Crowdstrike und Action1 würden grundsätzlich gut zusammenpassen. Nach den neuesten Kommunikationseskapaden wird das aber wohl nichts mehr. Anton Vierietin | shutterstock.com Anfang August 2024 tauchten erste Presseberichte über eine mögliche…
Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-9680, has…
Compliance rules requiring encryption backdoors — not just for attachments, but for text; not just for communications apps, but mobile devices, clouds, and SaaS apps — are being hotly debated…
The Australian Federal Government has introduced the Cyber Security Bill 2024 to Parliament proposing the country’s first standalone cybersecurity Act. The simplified outline of the Act proposes the following: This…