News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Critical vulnerability in Apple devices
B2B Cyber ​​Security ShortNews

Apple recently released a software update for iOS and iPadOS 15.6.1 to fix a zero-day kernel vulnerability identified as CVE-2022-32917. This critical vulnerability in Apple devices allows code execution with kernel privileges. Lookout explains how. Apple is aware of a report mentioning active exploitation of the vulnerability in the wild. This vulnerability could allow a maliciously crafted application to execute arbitrary code with kernel privileges. This CVE could affect Apple iPhone, iPad and iPod Touch models, meaning anyone using one of these devices will have their device immediately…

Read more

Identity Threats: New Identity Threat Protection

CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, has introduced Falcon Identity Threat Protection Complete, the industry's first fully managed identity threat protection solution. It brings together the Falcon Identity Threat Protection module and Falcon Complete managed service to prevent identity threats, enforce IT policies and provide professional management, monitoring and remediation. Protecting Identity and Credentials With the rise of remote working, identity is becoming the focus of attackers, who are increasingly targeting credentials to infiltrate an organization. According to the...

Read more

Forecast: VPN retires - SASE is coming
Forecast: VPN retires - SASE is coming

How will hybrid work continue? Palo Alto Networks predicts the end of VPN and the establishment of SASE - Secure Access Service Edge. With the security framework, security and network connectivity technologies are converged into a single cloud-delivered platform. In 2022, after nearly two years of remote work, millions of knowledge workers will adjust to a new rhythm and routinely work from both home and the office. This transition from pure remote work to hybrid work offers companies the opportunity to create a stable foundation for their employees...

Read more

Stop cyber attacks with remote browser isolation
Stop cyber attacks with remote browser isolation

Safe surfing using the zero trust approach for websites, email links and downloads. Ericom Shield blocks cyber attacks via the web browser, protects users from phishing attacks, malware, ransomware and other threats from remote use. Shield allows completely transparent internet usage. Most companies and institutions use different solutions to prevent employees from visiting problematic websites. The only problem is that between 10.000 and 30.000 new websites containing malicious code are identified every day. A single wrong click is enough to put the entire organization at risk: computers encrypted by malware, ransom demands, the loss of customer data ...

Read more

Safely optimize IT with RMM

With remote monitoring and management, IT administration can be massively relieved for small and medium-sized companies - and their infrastructure becomes more stable, more secure and more fail-safe. We answer the most important questions about the topic. The solutions for remote monitoring and management (RMM) are applications that are installed in your company on the servers and other devices such as PCs and mobile devices. In this way, an IT service provider or system house can remotely check their status and maintain the systems. What is the difference to a ...

Read more

TeamViewer enables remote access to QNAP NAS devices
B2B Cyber ​​Security ShortNews

TeamViewer is expanding its support for IT infrastructure solutions and now also supports remote access to physical network-attached storage devices (NAS) from QNAP. QNAP users can download the TeamViewer IoT Agent for their NAS from the QNAP App Center starting today. QNAP NAS devices are an integral part of regular backup and file sharing processes in many businesses, from large corporations to small offices. With the integration of TeamViewer, QNAP NAS administrators can now monitor the status of the NAS devices via the TeamViewer desktop client or the browser-based application and connect to them if necessary - secured by ...

Read more

Technical telephone fraud targets end users and SMEs
AvastNews

Millions of attacks by "technical telephone fraud" in Germany. Avast blocked 2,2 million attack attempts in one year alone and warns of the dangers. Fraudsters are particularly targeting end users and SMEs. Avast, a global leader in digital security and privacy solutions, warns of a continuing wave of tech phone fraud. The cybersecurity experts have recognized and blocked over 2,2 million attempts at the fraud scheme in Germany in the past twelve months. Information on the PC attracts the support hotline There are two types of technical telephone fraud: On the one hand, fraudsters call consumers directly ...

Read more

TeamViewer Remote Control App with biometric authentication
B2B Cyber ​​Security ShortNews

TeamViewer increases the security of the remote control app through biometric authentication. The latest version is supplemented by additional functions for mobile use. TeamViewer, a leading global provider of remote connectivity solutions and technologies for digitizing work processes, today announced new security features and usability improvements for the TeamViewer Remote Control app. Remote service via mobile device The app can be used to access computers, tablets, smartphones and other devices from a mobile device. For more security, the application will in future rely on the native biometric face and fingerprint authentication of Apple and Android mobile devices. This allows a ...

Read more

IT security in the hybrid working world

Mobilization - a new approach to IT security in the hybrid world of work. Cyber ​​defense has to be ready to switch between office and home office. An analysis by Daniel Clayton, VP of Global Services at Bitdefender. In the days of the home office, logging into a system in the evening from an unusual IP address no longer necessarily conceals an attack - but perhaps the employee in the second home. However, hybrid, decentralized work not only requires a learning process for evaluating conspicuous behavior: IT security as a whole has to be repositioned and the problems that arise ...

Read more

Phishing remains hacker's favorite
Phishing remains hacker's favorite

Phishing remains hacker's favorite: finally putting a stop to one of the oldest hacking tricks. Phishing is one of the oldest tricks in the cybercriminal arsenal. With this tactic, employees can become ignorant accomplices in a major cyber attack with just one click. Since the pandemic puts additional strain on employees, attackers are misusing the situation to capitalize on the crisis with a flood of corona-related phishing campaigns. Especially when cybercriminals gain access to legitimate login credentials through phishing attacks, the consequences for businesses can be devastating. Forrester estimates that 80 percent of security breaches are related to compromised privileged credentials….

Read more