Storys zum Thema Computerkriminalität
- Sprache:
- Medien:
- Zeitraum:
- Zeitraum:Gesamt
- 11mehr
The future of secure digital customer onboarding: With PXL Ident from fully automated identity verification to electronic signature
Berlin (ots) - ● The PXL Ident Software-as-a-Service solution now offers fully automated identity checks up to and including electronic signatures. ● The Swiss company digitises and automates the entire onboarding route as well as customer processes. ● Companies can minimise identity fraud and increase ...
mehrNew OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices
New OpenSSL vulnerability: Security company automatically detects affected software even in IoT / IIoT devices Widely popular OpenSSL software for data encryption urgently needs to be updated Düsseldorf/Germany, March 17, 2022 – A new security vulnerability threatens all systems that use OpenSSL, one of the most ...
mehrTeamDrive: Free Data Service for Ukraine Aid
TeamDrive: Free Data Service for Ukraine Aid Managing Director Detlef Schmuck: "A protected and eavesdrop-proof IT infrastructure represents the backbone of any well-organized aid effort" Hamburg/Germany, March 3, 2022 - The Hamburg-based data service provider TeamDrive is now making its cloud service for data exchange available free of charge to all people with a Ukrainian passport, all privately organized Ukraine aid ...
mehrElatec introduces TWN4 MultiTech Nano LEGIC 63 M / Time recording and mobility: New reader for mobile authentication
mehrHackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers
Hackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers - IoT Inspector and CHIP examine devices from AVM, Asus, Netgear, and more - New German coalition announces manufacturer liability for damages caused by IT security vulnerabilities Bad Homburg/Germany, December 2, 2021 - Nine Wi-Fi routers from well-known manufacturers recently ...
mehrExtended EU RED Directive enforces higher IoT security by 2024
Extended EU RED directive enforces higher IoT security by 2024 80 percent of cyberattacks are directed against wireless devices Bad Homburg/Germany, November 9th, 2021 – The Internet of Things, i.e. especially all wireless smart devices, poses one of the greatest risks in information technology. By introducing new security requirements, the EU Commission is now significantly raising the bar for manufacturers and ...
mehrProtection against critical security gaps in telecommunication networks
Protection against critical security gaps in telecommunication networks IoT Inspector saves Swisscom €350,000 per avoided faulty software rollout and update Bad Homburg/Germany, October 28th 2021 – With a turnover of over 10 billion euros and almost 20,000 employees, Switzerland’s technology and telecommunications company Swisscom is the industry leader in its ...
mehrJan C. Wendenburg appointed new CEO of IT security specialist IoT Inspector
mehrSevere SDK vulnerabilities at Broadcom due to copy-paste engineering
Severe SDK vulnerabilities at Broadcom due to copy-paste engineering - Cisco small business routers and other well-known manufacturers affected - Vulnerabilities discovered as early as 2011, yet still resurface Bad Homburg/Germany, October 7th, 2021– Hardware components from Broadcom can be found in numerous devices from leading vendors such as Cisco, DD-WRT or ...
mehrElatec Receives Patent for USB Rotary Connector / 360° Mounting: Reader with a Special Twist
Munich (ots) - Elatec's TWN4 USB Front Reader makes it easy to retrofit authentication solutions with a plug & play solution. Elatec has now been granted a patent in Europe and the USA for the reader's USB rotary connector. This enables a unique 360° mounting of the reader. With this extraordinary solution, the company once again demonstrates its innovation and ...
mehrCritical security vulnerabilities in Realtek chips affect more than 65 hardware manufacturers
mehrFYEO Launches Publicly, Acquires Threat Intelligence Firm Intelliagg, Forms Advisory Board
NEW YORK (ots) - --News Direct-- FYEO Inc., a threat monitoring and identity access management platform, today announced its exit from stealth mode with its first B2B product offering, FYEO Domain Intelligence (“FYEO DI”), and the acquisition of threat intelligence firm Intelliagg. Incubated by enterprise technology and cybersecurity consultancy BTblock, FYEO has ...
mehr- 2
Southeast Asia eCommerce platform Lazada launches public bug bounty program with YesWeHack
mehr Google alternative: Search engine Swisscows starts selling shares
Egnach, Switzerland (ots) - Swisscows (www.swisscows.com), the alternative, data-secure search engine from Switzerland, is now selling limited non-voting shares for CHF 150, so-called participation certificates. Privacy and data protection Unlike Google, Swisscows offers the user secure and data protection compliant use and is considered a family-friendly search engine that does not list any pornographic or violent ...
mehrAcronis Unites with Industry Leaders to Publish the First Unified Cybersecurity Guide for Boards of Directors
SCHAFFHAUSEN, Switzerland (ots) - Acronis, a global leader in cyber protection and a member of the World Economic Forum (WEF) Centre for Cybersecurity, shared the results of a new report released by the WEF that warns that cybersecurity failure is a “clear and present danger” and critical global threat, yet ...
mehrDriveLock Named as Leader for Data Leakage/Loss Prevention Solutions
Munich, Germany (ots) - ISG Provider Lens(TM) lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data security regulations DriveLock SE, a leading global provider of IT and data security solutions, announced that the "ISG Provider Lens(TM) Cyber Security - Solutions & Services Report Germany 2020" named it as the leader in the Data Leakage/Loss Prevention (DLP) segment ...
mehr- 2
NEW SURVEY REVEALS GLOBAL DEMAND FOR CUTTING-EDGE SOLUTIONS AS ACRONIS CYBER PROTECT 15 IS LAUNCHED
mehr Amsterdam District Court Decides In Favor of Proctorio and University of Amsterdam
Scottsdale (ots) - Win for Proctorio and online education as a whole. Students of UvA and other similar universities can now continue their education from their own home without sacrificing integrity or the validity of the degrees they earned. With the rapid spread of COVID-19, universities all over the world have been forced to transfer their physical learning ...
mehrFraunhofer-Institut für Sichere Informationstechnologie SIT
New code scanner finds software vulnerabilities without source code
mehrFraunhofer-Institut für Sichere Informationstechnologie SIT
Danger over the phone / Researchers at Fraunhofer SIT find serious security flaws in VoIP telephones
mehrHesco Defends Trademark in China
Leeds, England (ots/PRNewswire) - Brand successfully maintains rights to 'HESCO' Hesco Bastion Ltd has successfully defended its 'HESCO' trademark in China. The registered trademark was upheld after a Chinese manufacturer failed in its attempt to cancel the mark. The China National Intellectual Property Administration reached the decision to uphold Hesco's trademark and refuse the cancellation action after reviewing evidence of Hesco's use of the name in China. Hesco has ...
mehrCOMPUTER BILD Exclusive: PlayStation Server Scan Logfiles Uncover True Scope of Sony's Sloppy Data Security
Hamburg (ots) - Scan logs show that Sony servers were running extremely dated programs and Web services - vulnerabilities of obsolete software known for years on the Internet It was the largest data theft ever: on the 19th of April, hackers broke into Sony servers and stole the personal information of more than 100 ...
mehrPAN AMP: 9th Congress on European Security and Defence
Berlin/Hamburg (ots) - In the preparatory stage of the 9th Congress on European Security and Defence (Berlin, 9th/10th November 2010) Robot-Technology® (10|06) for automated capture, evaluation and documentation of cyber attacks was presented for the first time. The technology performs an automated tracking of virtual attacks through the internet and Deep Internet® against processors, computers, systems or networks, and ...
mehr