Cyber security news for all

More

    Instructions

    The top OSINT browser add-ons

    Approximately 75 percent of the work on internet research or Open Source Intelligence (OSINT) is done in the browser. Add-ons should support and help,...

    Account hacked despite 2-factor authentication?

    More and more companies rely on two-factor authentication. With the creativity that users have when assigning their passwords, it is no wonder that the...

    How Works The Safe Security Switch To VoIP

    Telephone via IP networks has arrived in many companies in the recent years. The new all-IP technology has so many advantages that the classic ISDN...

    Cyber Risks Of Embedded Video Systems

    Digitization and networking are also changing video security technology fundamentally: Classic analog video cameras with directly assigned video recording devices are becoming more and...

    Microsoft Is Entering The Business With The Azure-Based Virtual Desktop Security

    Desktops in the cloud are no longer revolutionary. For a long time, these have been offered as so-called desktops by players such as Amazon...

    Cynet Leads Companies To Identify Threats To Their IT Security

    Whether in the automotive industry, in mechanical and plant engineering or in the consumer goods sector - digitization does not stop at any industry....

    Recent Articles