Cyber Security

Many companies overestimate their ability to recover from a cyberattack

A study highlights risks in corporate backup and recovery strategies. Cyberattacks are increasingly targeting not only production IT systems, but also specifically backup and recovery infrastructures. A recent investigation by DATA REVERSE® Data Recovery shows that...

Hackers use Google AI to take over smartphones

ESET discovers first Android malware to use generative AI Cybercriminals have crossed a technological threshold: for the first time, Android malware is using generative AI on the fly to embed itself in infected devices and take control of them. Researchers at European...

GData:Cybersecurity measures and guidelines:

Majority of company employees cope well in their everyday work IT security is fully effective when it is also supported by the workforce For effective IT security, it is important that company employees are able to work well with the measures and guidelines that have...

Trust seal for data centres in the Middle East

BSI establishes global standard for security, availability and sustainability Data centre boom calls for new trust mechanisms The global expansion of data centres is accelerating rapidly. Artificial intelligence, cloud computing and data-intensive applications are...

Fake dating app serves as spying tool

Current campaign shows how effective social manipulation is Online dating is a popular hunting ground for cybercriminals. Security researchers at ESET have now uncovered a digital romance scam in Pakistan that is completely new in this form. Hackers use a manipulated...

Security Essen 2022