A major provider of adult entertainment published detailed statistics on activities on its website punctually at the end of the year. Why this statistic is interesting for IT security and how the Canadian operator of this website handles sensitive data.
In addition to the many forms of cyber crime, one kind of data theft often goes unnoticed in public reporting and perception: RFID technology and so-called RFID skimming. The data stored on the chip is read by attackers. For example, criminals can quickly focus on their own bank cards. Every year, around 7 million pounds…
All channels that have made it their business to report against new malware, scams and dangers are warning against the GermanWiper Ransomware. As is so often the case, everything starts with an application. Then the malware takes its course.
It is an extraordinary auction – and probably the most expensive virus catapult in the world. The artwork called “The Persistence of Chaos” is a laptop infected with a wide variety of malware that has now been auctioned off for more than a million USD.
The Exploit 10KBLAZE construction kit was opened and represents a major danger for the majority of all SAP systems. The Office for Cyber Security and Digital Infrastructure (CISA) from the USA announced a public warning message for the SAP systems on May 2, 2019.