News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Is TikTok a threat to government workers' mobile devices? 
B2B Cyber ​​Security ShortNews

The US Senate has passed legislation to ban federal employees from using TikTok on state-owned devices. Is the Chinese operator of TikTok, ByteDance a danger? Possibly also for European or German officials and government employees? The vote is the latest action by US lawmakers to crack down on Chinese company ByteDance amid national security agencies' fears Beijing could misuse the TikTok app deployed on officials' mobile devices to spy on Americans. A comment from Akhilesh Dhawan, Senior Director of Security Solutions at Lookout. Want to spy on TikTok too?…

Read more

Spy software Pegasus: EU wants ban

According to an interview by WirtschaftsWoche with Vera Jourova, Vice President of the EU Commission, her authority wants to take action against the use of the Pegasus spy software. Europe must show that it values ​​data protection highly. As the Vice-President of the EU Commission Vera Jourova announced, one cannot demand more from the USA in terms of data protection and at the same time let the spy software Pegasus run free in Europe. one must first “put one's own house in order”. Ban Pegasus spy software Europe could do a much better job of convincing the rest of the world of the value of data protection if spy software…

Read more

BSI issues warning about Kaspersky software!
B2B Cyber ​​Security ShortNews

According to Section 7 of the BSI Act, the Federal Office for Information Security (BSI) warns against the use of virus protection software from the Russian manufacturer Kaspersky. The BSI recommends replacing applications from Kaspersky's virus protection software portfolio with alternative products. Antivirus software, including the associated real-time capable cloud services, has extensive system permissions and, due to the system (at least for updates), must maintain a permanent, encrypted and non-verifiable connection to the manufacturer's servers. Therefore, trust in the reliability and self-protection of a manufacturer as well as his authentic ability to act is crucial for the safe use of such systems. When…

Read more