Cyber Security
Easily store, find, view and manage your videos

Easily store, find, view and manage your videos

Collects videos from cameras and support real-time preview, Records / stores videos to a storage device Provides an interface to view live videos, access recorded videos and download videos. Easily configure to meet your needs Foscam VMS allows you easily to manage...

Cyber criminals don’t take summer holidays

Cyber criminals don’t take summer holidays

Check Point says educational and research institutions are big targets for hackers during summer break. Check Point Research (CPR), the threat intelligence division of Check Point® Software Technologies Ltd, a provider of cyber security solutions, has continued to...

WinRAR vulnerability

WinRAR vulnerability

WinRAR, the widely used programme for compressing and archiving files, had a serious security vulnerability in older versions. This vulnerability allowed potential attackers to execute arbitrary code after opening a suitably prepared archive. A security researcher...

Collected comments on the BKA Cybercrime Report 2022

Collected comments on the BKA Cybercrime Report 2022

On 15.08.2023, the current "Bundeslagebild Cybercrime 2022" of the BKA was published. Here are the most important findings of the report at a glance: 136,865 registered cases in 2022, decrease of 6.5% compared to 2021 Ransomware and phishing still the biggest threats...

AI-powered whaling attacks threaten CEOs, MPs and the military

AI-powered whaling attacks threaten CEOs, MPs and the military

Comment by Richard Werner, Business Consultant at Trend Micro "Whaling" is all about the big catch. The targets of cybercriminals are executives of successful companies, high-ranking officials and the military. The aim is to steal information or siphon off large sums...

Secure hybrid networks with SASE and Zero Trust

Hybrid infrastructures with traditional security applications can no longer withstand modern threat scenarios. Now is the time for companies to upgrade. With a Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE), they get an all-round solution that...

Security Essen 2022