Contactless payment is on the rise. It works in seconds and is available at more and more locations. This is made possible by so-called Near Field Communication (NFC). This works with EC and credit cards, but also with mobile devices such as smartphones or intelligent watches.
What does a hacker do and what is hacking actually? There are no fixed definitions, but Wikipedia defines “hacking” as a measure to manipulate or completely break security mechanisms of a system. With this approach unforeseen ways of manipulating or attacking a system can be found.
Office 365 is not only the next version of the “Office Package”, but it bundles different applications and services from Microsoft to represent a digitalized office. Central business functions are Microsoft Teams, SharePoint and Exchange. Teams is a chat program, SharePoint is used to manage knowledge within a company and … continue reading
Home office is becoming more and more popular due to current events revolving around COVID-19. Around the world, companies and governments are rapidly taking responsible measures to protect the health of their employees and citizens while remaining operational – including encouraging people to work from home.
In the digital world, it’s not enough to simply sit at your computer at home to start work – what do you, as a user or a responsible person, need to do to secure your business in the digital space?
Criminals are opportunistic. It’s not for nothing that the saying “opportunity breeds thieves”. The past has already shown that widely scattered news and crisis situations lead to criminals taking advantage of them, for example in the Australian bush fires at the beginning of the year. Because the corona virus activates … continue reading
A critical vulnerability (CVE-2020-0796) called “EternalDarkness” in the SMB protocol was reported yesterday in Windows systems, specifically Windows 10 and Windows Server. The vulnerability can be prevented on servers with a workaround, but not on private machines. In any case, Microsoft recommends updating systems as soon as updates are available … continue reading
The coronavirus is going around and forces more and more companies to let employees work from home. This leads to different consequences on a medical, social and economic level. The forced home office more or less “forces” companies to modern work and digitalized processes. One opportunity that arises from this … continue reading
Internet fraud has become a constant threat. Whether on eBay, Facebook or Amazon. By email, phone or chat fraudsters are trying to get our information, identity or money. The idea of scamming people is older than the Internet. There are sources that point out that cheating already took place at … continue reading
Modern crime is increasingly shifting to the Internet and hits companies of all sizes and industries with full force – a modern digital risk management tool helps to recognize the attack potential of your company at an early stage, to check suppliers and to close and reduce security gaps on … continue reading
As a pentester you need a broad arsenal of hacking tools. These are just as important as a sharp mind and stubbornness. As a pentester, you use hacking tools to uncover vulnerabilities in a system and report them to the company being tested. Which are considered hacking tools? With hacking … continue reading