Fraunhofer-Institut für Sichere Informationstechnologie SIT
Stories about Sicherheitstechnologie
- more
EU Cyber Resilience Act becomes a Tour de Force for the Industry
EU Cyber Resilience Act becomes a Tour de Force for the Industry Time-to-market becomes a gamble without automated analysis routines Düsseldorf/Germany, October 10, 2022 – All products with digital elements – from routers to smart refrigerators to televisions and, above all, any modern industrial equipment – should no longer pose cyber risks to users in the future. This is what the EU Commission is demanding, and ...
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Mechanism for Internet security broken
moreONEKEY announces automated detection of zero-day vulnerabilities
ONEKEY announces automated detection of zero-day vulnerabilities New platform for automated discovery of unknown 0-day vulnerabilities for producers of connected devices and operators of industrial control systems Düsseldorf/Germany, September 29, 2022 – For the first time, European IoT/OT security specialist ONEKEY is enabling software-based automated detection of ...
moreExperts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products
Experts recommend: Managing Risks in the Software Supply Chain of Industrial Equipment & Products New expert whitepaper on managing risks in the software supply chain using IEC 62443 and automated software BOMs now available! Düsseldorf/Germany, September 7, 2022 – With a new cybersecurity agenda, the German government wants to improve the security of industrial ...
moreONEKEY redefines IoT Security with UNBLOB
ONEKEY redefines IoT Security with UNBLOB ONEKEY open sources its high-performance firmware extraction suite Düsseldorf/Germany, August 4, 2022 – With the open-source release of the new binary extraction suite "UNBLOB", ONEKEY provides a core component of its automated firmware security analysis platform to the infosec community. This will set a new milestone in the battle to raise security to a new level in the field ...
more
Cybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON
Cybersecurity "Made in Germany": ONEKEY at Black Hat and DEF CON IoT security specialist ONEKEY presents new technology and tools at the two most important IT security conferences in 2022 Düsseldorf/Germany, July 18, 2022 – The two tech conferences Black Hat and DEF CON are considered the unofficial nerve center of global IT security. German companies are rather rarely allowed to present at these two events. This ...
moreStudy uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS
Study uncovers vulnerable IoT devices and facilities: Medical, manufacturing and CRITIS IoT security report 2022 reveals significant gaps in cybersecurity Düsseldorf/Germany, July 6, 2022 – Cybersecurity is still thought of in silos – that is the conclusion of a study by IoT security specialist ONEKEY. "In many cases, companies and entrepreneurs still think in ...
moreIT study reveals glaring vulnerabilities: Industry must protect IoT controls
IT study reveals glaring vulnerabilities: Industry must protect IoT controls Industrial systems are moving into hackers' focus worldwide and pose enormous risks Düsseldorf/Germany, June 2, 2022 – With the increasing use of intelligent machines integrated into an entire manufacturing network, the risk of hacker attacks is rising enormously. An IT study reveals that ...
moreIoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance
IoT Inspector becomes ONEKEY – The Central Platform for Automated IIoT/OT Security and Compliance New name underlines expanded focus for industry (IIoT), manufacturing (OT) and Internet of Things (IoT) Düsseldorf/Germany, May 3, 2022 – German IT security company IoT Inspector is giving itself a new name. The specialist team for automated analysis of IoT devices ...
moreComodo and Distilogix Partner to Deliver Zero Trust Endpoint Protection to Enterprises in the Middle East, Africa and the Eastern European Region
Bloomfield, NJ (ots) - --News Direct-- Comodo Security Solutions, a leading provider of endpoint protection, today announced that they have partnered withDistilogix Distribution to boost presence and better support enterprise customers in the Middle East, Africa, and the Eastern European region. Both companies are ...
moreNew OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices
New OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices Widely popular OpenSSL software for data encryption urgently needs to be updated Düsseldorf/Germany, March 17, 2022 – A new security vulnerability threatens all systems that use OpenSSL, one of the most ...
more
Hackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers
Hackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers - IoT Inspector and CHIP examine devices from AVM, Asus, Netgear, and more - New German coalition announces manufacturer liability for damages caused by IT security vulnerabilities Bad Homburg/Germany, December 2, 2021 - Nine Wi-Fi routers from well-known manufacturers recently ...
moreExtended EU RED Directive enforces higher IoT security by 2024
Extended EU RED directive enforces higher IoT security by 2024 80 percent of cyberattacks are directed against wireless devices Bad Homburg/Germany, November 9th, 2021 – The Internet of Things, i.e. especially all wireless smart devices, poses one of the greatest risks in information technology. By introducing new security requirements, the EU Commission is now significantly raising the bar for manufacturers and ...
moreJan C. Wendenburg appointed new CEO of IT security specialist IoT Inspector
moreSevere SDK vulnerabilities at Broadcom due to copy-paste engineering
Severe SDK vulnerabilities at Broadcom due to copy-paste engineering - Cisco small business routers and other well-known manufacturers affected - Vulnerabilities discovered as early as 2011, yet still resurface Bad Homburg/Germany, October 7th, 2021– Hardware components from Broadcom can be found in numerous devices from leading vendors such as Cisco, DD-WRT or ...
moreCritical security vulnerabilities in Realtek chips affect more than 65 hardware manufacturers
moreseca and Imprivata focus on more security and standardization in user authentication
more
FYEO Launches Publicly, Acquires Threat Intelligence Firm Intelliagg, Forms Advisory Board
NEW YORK (ots) - --News Direct-- FYEO Inc., a threat monitoring and identity access management platform, today announced its exit from stealth mode with its first B2B product offering, FYEO Domain Intelligence (“FYEO DI”), and the acquisition of threat intelligence firm Intelliagg. Incubated by enterprise technology and cybersecurity consultancy BTblock, FYEO has ...
moreCyvatar Raises an Additional $9 Million in Series A Round
more- 2
Southeast Asia eCommerce platform Lazada launches public bug bounty program with YesWeHack
more Acronis Unites with Industry Leaders to Publish the First Unified Cybersecurity Guide for Boards of Directors
SCHAFFHAUSEN, Switzerland (ots) - Acronis, a global leader in cyber protection and a member of the World Economic Forum (WEF) Centre for Cybersecurity, shared the results of a new report released by the WEF that warns that cybersecurity failure is a “clear and present danger” and critical global threat, yet ...
moreGISEC 2020: Lucy Security presents their new version of the Lucy Awareness Platform
Zug/Switzerland (ots) - The Swiss company Lucy Security, one of the largest providers of cybersecurity awareness training with over 10,000 installations worldwide and over 22 million trained users, presents the new version of the Lucy Awareness Platform at its booth C15 in Hall 1 at GISEC, the cybersecurity exhibition at GITEX TECHNOLOGY WEEK in Dubai from December 6 - ...
moreAcronis Cyber Protect Integration Enhances Security for Citrix® Workspace(TM)
London, UK (ots) - Acronis today announced the development of an integrated solution for managed service providers (MSPs) designed to enhance the protection of their clients' Citrix Workspace assets, no matter where they sit. Secure, intelligent, and high-performing digital workspaces that enable greater employee productivity and engagement, such as the Citrix ...
more
- 2
NEW SURVEY REVEALS GLOBAL DEMAND FOR CUTTING-EDGE SOLUTIONS AS ACRONIS CYBER PROTECT 15 IS LAUNCHED
more Acronis Cyber Protect Cloud: a "Cure" Against Cyber Threats
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
New code scanner finds software vulnerabilities without source code
moreFraunhofer-Institut für Sichere Informationstechnologie SIT
Danger over the phone / Researchers at Fraunhofer SIT find serious security flaws in VoIP telephones
more