News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Simple email encryption with QUICK
B2B Cyber ​​Security ShortNews

Cryptshare receives patent for simple, encrypted communication. QUICK Technology, developed in Germany, has now been patented. The technology for e-mail encryption puts the focus on the user and at the same time ensures a high level of security. E-mail encryption is a major challenge for many, since solutions are usually too complicated for users. It is therefore the aim of Cryptshare AG to make secure communication as easy as possible for users. The German software manufacturer developed QUICK Technology for this purpose, which has now been patented in Germany (patent number 10 20 17 201 142). This technology eliminates the…

Read more

How hackers launch their phishing networks

Bait attacks, also known as reconnaissance attacks, are usually emails with very short or empty content. The aim is to check the victim's email accounts. Barracuda Networks' Bait Attack Tips. In view of the increasing professionalization of cyber criminals, companies must be able to ward off all kinds of attacks. However, with extremely elaborate attacks, there is a risk that hackers will succeed in infiltrating the network and moving there unnoticed. In order to use such an emergency for the clarification of the opposite side, it is well known that there are now ...

Read more

Barracuda extends email protection
Barracuda News

Forensics and Incident Response: Barracuda extends email protection with automated workflows and the integration of open APIs. Service is part of Barracuda's Total Email Protection platform and helps companies efficiently detect, investigate and remediate targeted email attacks. Cloud security specialist Barracuda Networks has equipped its Forensics and Incident Response service with new functions for proactive threat detection. Companies can now use public APIs to integrate their current SOAR / SIEM solutions. The new automated workflows allow administrators to create a playbook for specific needs of individual applications. Enhanced Incident Response Capabilities The Enhanced Incident Response Capabilities are part of the Barracuda Total Email Protection offering, the Barracuda's complete portfolio of ...

Read more

Companies: 25 percent already had an email security vulnerability

As a Hornetsecurity survey shows: 1 in 4 companies suffered from at least one email security breach. 62% of all security breaches are caused by compromised passwords and phishing attacks. Email security is one of the most important issues for any IT department, and for good reason. Security gaps quickly lead to the loss of sensitive data, operational downtimes and lost sales. In a survey on email security among more than 420 companies that use Microsoft 365, Hornetsecurity found that 23%, i.e. every fourth company, has already reported a security breach in connection with emails. Phishing Attacks At The Top Of These ...

Read more

Overtired IT teams lose the battle against phishing
Overtired IT teams lose the battle against phishing

New Ivanti study: Overtired IT teams and poorly prepared employees are losing the battle against phishing. Almost three quarters of businesses were phishing attacks last year. One reason: More than half suffered from a shortage of IT specialists. Ivanti, the automation platform that detects, manages, secures and maintains IT resources from the cloud to the edge, has presented the results of a recent survey on phishing attacks. The central message of the study: The global shift of work to remote locations has significantly increased the number of attacks, their sophistication and the effects of phishing attacks….

Read more

Email encryption in the cloud
Email encryption in the cloud

Five challenges with e-mail encryption in the cloud: If e-mails are unencrypted on the server, all information can be copied and read by attackers. Software as a Service (SaaS) makes life easier for companies in many ways: The providers not only ensure that sufficient computing power is available. You also import updates and patches for applications such as Office or e-mail services and thus close security gaps quickly. Especially after the critical weak points in Microsoft Exchange Server at the beginning of March, this aspect increases the attractiveness of Microsoft 365 (M365) as a SaaS solution. However, companies may ...

Read more

Authentic and audit-proof emails
Every third suspicious email is also a threat

Authentic and audit-proof e-mail communication via blockchain: totemo starts totemomail Verified in January 2021. E-mail is still the universal means of communication, especially in business life, although its advantages are offset by disadvantages such as phishing risks or the lack of audit security. With totemomail Verified, totemo, provider of secure electronic communication in the business environment, presents a solution that solves these challenges with the help of distributed ledger technology (DLT). The technology was developed in cooperation with Vereign, in the context of which Dario Perfettibile, CEO of totemo, was elected to the board of directors of the crypto start-up. Authenticity: Is the sender who he ...

Read more

Phishing emails are dangerous even without a link
SophosNews

So far it was clear: an email with a strange link - hands off! But now the phishing gangsters have come up with a new trick to deceive users without any links. But even these fraud attacks can be identified and neutralized in good time with a little attention. It is the eternal “game” between security specialists and cyber crooks: who is faster, more creative and has the longer breath. True to this motto, the internet villains have come up with something new again: phishing emails without a link. Most phishing emails are built on three main components An email with ...

Read more

Danger: home office & emails
Email company marketing

In times of home office in particular, emails as corporate communication are always a cyber threat. Here is an overview of the five worst mistakes in email communication. In view of the increasing number of corona cases, a “second wave” in autumn is a likely scenario. It is still unclear what containment measures will be taken this time. The first lockdown phase showed that efficient communication with and between employees is a decisive success factor for companies. If it takes place via e-mail, it is often slowed down by errors that can be easily avoided. We have compiled the most important ones for you here. 1….

Read more

Study: hardly any encrypted emails
B2B Cyber ​​Security ShortNews

The new REDDOXX study confirms the status of e-mail: only one in eight uses encrypted e-mails. 93% of the respondents definitely do not see an obsolete model in the e-mail. Email remains an important communication medium. Spam is still a problem. And e-mail encryption is certainly considered to be sensible - but there is no lack of reasons for not encrypting it after all. These are some of the central results of a new study by REDDOXX on the “Status of e-mail in Germany”, in which 1.087 full-time employees were surveyed. Use of e-mail, especially for professional purposes E-mail is obsolete? See that ...

Read more