IT Security

Google removes risky ‘ Bread ‘ applications from the Play Store

Google pulled about 1,700 separate apps that were part of a family of potentially unwanted services from its Google Play application store.  This family of potentially harmful applications–dubbed “Bread” and also known as “Joker” –was involved in billing fraud and first observed in 2017, where the apps focused solely on SMS fraud.  Over time, the

[ Read More ]

Firefox Zero-Day Patches Exploited for Targeted Attacks

Mozilla released Wednesday updates for its Firefox browser address a zero-day vulnerability exploited in target attacks. This bug was described by Mozilla as a “IonMonkey style uncertainty with StoreElementHole and the FallibleStoreElement,” reported as CVE-2019-17026 and classified as having a critical effect. IonMonkey is the just in time (IIT) compilers for the SpiderMonkey JavaScript engine.

[ Read More ]

Web hosting service charged $10 million in GDPR Penalty

The German Data Protection Regulator, the Federal Commissioner for Data Protection and Information Freedom (BfDI), has imposed a GDPR fine of € 9.55 million ($10.64) on the German telecommunications provider 1&1 Telecom GmbH. This is described as “in the lower range of possible fines,” primarily due to the cooperative response of 1&1 to the investigation

[ Read More ]

Alternative Secure Email Infra For The Enterprise

Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware

[ Read More ]

The Forgotten IT Security Aspects Of Healthcare Firms

The Healthcare sector’s continued problem with cybersecurity vulnerabilities will continue for many years to come. As long as their equipment follows the principle of “use it until it physically breaks down.” In the world of IT, such a process does not work from the standpoint of security and privacy, especially in the aspect of the

[ Read More ]

Safely Dealing With Network Security In The Age of BYOD

The introduction of telework that allows people to work from outside the office using PCs and smartphones is also in progress. If telecommuting spreads, employees will be able to spend time commuting to work. In addition, you can flexibly work according to personal circumstances, such as being able to work while raising children and taking

[ Read More ]

Timid Cloud-Infrastructure Adaptation Is A Risky

Today’s use of the cloud infrastructure in the enterprise is advancing and adoption is accelerating, but we still hear opposition to it, with claims that making cloud-computing the centerpiece of the firm’s computing dependence is a huge security concern. On the other hand, it is also true that there is a big advantage such as

[ Read More ]

The IT Security Challenges All Small Businesses Face

The world’s rapidly increasing cyber attacks do not know where to stay and are evolving their attack methods on a daily basis. Many companies regardless of size are good prey for attackers. The impact of cyber attacks continues to increase, regardless of the size of the company or organization. Most people will think security measures

[ Read More ]

Firm’s Convenience VS Security, A Free Choice

As we have emphasized in this website many times in the past, security and convenience are two opposing principles when it comes to the digital lifestyle of an individual or a business entity. Each time convenience becomes the focus for an entity, the natural side-effect of a wider attack surface is the result. The measure

[ Read More ]