Chinese researchers have discovered a way to rapidly decrypt satellite phone communications -- within a fraction of a second in some cases.
As the latest incidents in the clinic, Neuss in Germany show cyber dangers have emerged as a part of hospital managers’ reality
의료 데이터, 해커들의 공격 대상으로 부상.2016년 2월 독일 Neuss지역 Lukas병원에서 발생한 사이버공격은 더 이상 병원이 사이버공격으로부터 안전지대에 있지 않다는 것을 보여주는 사건이었다.
About 40% of small- and midsized businesses hit with ransomware paid their attackers, but less than half got their information back.
Companies that choose to outsource their IT operations should be careful. Suspected Chinese hackers have been hitting businesses by breaching their third-party IT service providers.
4차 산업혁명, 산업인터넷, 사물인터넷. 미래에 다가오는 새로운 산업 콘셉트를 설명하기 위해 다양한 용어들이 사용되고 있는 가운데,..
Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.
ใช่ว่าจะไม่มีวิธีป้องกันใดๆ เลย ผู้เขียนได้มีโอกาสพูดคุยกับ นาย ทีมอน คริเทนบริงก์ ซีอีโอจากบริษัท Bosen AG
컨설팅 업체, 투명성을 팔다 Bosen 인터뷰. 다양한 경로로 보안 업계로 인재들이 투입되고 있다는 사실 자체도 희망이지만, 의미 있는 보안업계의 변화를 위해 수익 모델을 바꾼 사람도 있다.
Reports suggest that the six executives who have been arrested were revealing commercial secrets to Coolpad Group and its largest shareholder LeEco.
"You should expect your networks to be hit if you are involved in any significant financial interactions with certain foreign states," (CSIS)
Viele IT-Entscheider halten Outsourcing für den einzigen Weg, ihr Unternehmen effektiv abzusichern. Eine individuell und nachhaltig konzipierte Inhouse-Lösung wäre hier oft die bessere Wahl.
The theft of the partner emails is a serious matter for law firms, which handle a wide variety of sensitive business issues and enjoy a reputation for confidentiality and discretion.
The most obvious security-related improvement was construction of a $1.8 million Integrated Security Operations Center. The ISOC consolidation has helped speed up threat response and coordination, according to IT executives.
To counter the foreign espionage threat, some of the largest U.S. defense contractors have formed their own counterintelligence programs.