
Smartphones as a smart gateway for hackers
Image Credit: Maxim Ilyahov via Unsplash 20.05.2021 Smartphones as a smart gateway for hackers Cybersecurity | IT Protection | Attack Vectors For some time now, cybercriminals have identified and exploited
Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.
Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Image Credit: Maxim Ilyahov via Unsplash 20.05.2021 Smartphones as a smart gateway for hackers Cybersecurity | IT Protection | Attack Vectors For some time now, cybercriminals have identified and exploited

Most recently, you can read more and more about data scraping incidents on Facebook, LinkedIn or Clubhouse. But what exactly is behind this data collection? We’ll tell you.

Reputable cloud providers such as DATEV offer companies, law firms and self-employed people very high security standards. This makes it all the more important to also pay attention to cybersecurity when using these cloud solutions – so as not to allow vulnerable vulnerabilities to arise.

Do you know this too? You are engrossed in a project, working on an important document, are in a productive peak phase and suddenly: standstill. The mouse cursor cannot be moved, the computer freezes and the supposedly only way to continue the project is to restart the computer. At this point, at the latest, the inner reproach spreads: “If only I had made a backup copy…”. We know better, but what is holding us back?

In the event of a cyber emergency, it is important to have a fast, deliberate response – incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.

Artificial intelligence – or “AI” for short – is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?

Not only conscious, but also resilient: An important building block in a cyber security strategy is employee awareness, the awareness that and which cyber threats exist. Coupled with the knowledge of where the dangers lurk, what they look like, how to behave in an emergency and how best to protect yourself, cyber resilience, the resistance of companies to cyber threats, can be significantly increased.

In IT, forensic experts are among the most sought-after specialists of all, both by investigative authorities and in companies. They take care of securing evidence and evidence in the event of a cyberattack. We asked our forensics expert Julian Krautwald about his work. In the first part of our conversation, we learn: What does an IT forensic scientist actually do?

As soon as the first positive news about Corona vaccines arrived, the cybercriminals got ready to get started: Corona vaccinations as a hook for phishing attacks, espionage and sabotage of research results, attacks on supply chains and dubious offers of counterfeit vaccines on the darknet – the cybercriminals quickly instrumentalized the topic for themselves. How can they be stopped?

In recent years, the malicious botnet Emotet has consistently topped the rankings of the most dangerous cyber threats. Now the malware, which has been spreading as a Trojan since 2014, has been rendered harmless as part of a concerted action by Europol and the BKA. What does this mean for the current threat situation? Is the risk of cyberattacks now lower? Yes and no, because there are countless other attackers and cybercriminals lurking out there.