Computer

VPN Encryption is Not Useful For All Scenarios!

VPN Encryption is Not Useful For All Scenarios!

Data protection scandals, security breaches, hacking, and various mass surveillance scenarios have led users to worry about their privacy on the Internet. They often then turn to VPN services, but they are not always useful. VPN encryption is not useful for all scenarios The Internet is seemingly becoming an increasingly dangerous space for its users. …

VPN Encryption is Not Useful For All Scenarios! Read More »

What is Spyware?

What is Spyware

Spyware is software that spies on and records activities on the computer or on the Internet without the user’s knowledge. This information can be passed on to third parties and misused for purposes such as advertising. What is Spyware? Spyware in German means spying or snooping software and refers to a program that spies on …

What is Spyware? Read More »

The 10 Riskiest IoT (Internet of Thing) Devices

The 10 Riskiest IoT Internet of Thing Devices

When it comes to vulnerable IoT systems, many first think of modern smart devices like digital assistants or smart watches. Yet the greatest risks lie with typically unmanaged IoT devices in the smart building, healthcare, network and VoIP, and operations technology sectors. A recent study by ForeScout reveals which IoT devices pose particular risks. The …

The 10 Riskiest IoT (Internet of Thing) Devices Read More »

What is CVE (Common Vulnerabilities and Exposures)?

what is cve

Common Vulnerabilities and Exposures (CVE) is a standardized list of vulnerabilities and security risks of computer systems. Thanks to the unique naming, the exchange of data about vulnerabilities and security risks is simplified. Sequential numbers uniquely identify the various entries. What is CVE? The acronym CVE stands for Common Vulnerabilities and Exposures. It is a …

What is CVE (Common Vulnerabilities and Exposures)? Read More »

What is Multi-Factor Authentication (MFA)?

What is Multi-Factor Authentication MFA

Multi-factor authentication (MFA) uses a combination of two or more credentials to verify identity. The security of logon procedures can be significantly increased thanks to MFA. Identity theft is made more difficult. What is multi-factor authentication (MFA)? Multi-factor authentication, or MFA for short, is an authentication method that combines two or more credentials (factors). MFA …

What is Multi-Factor Authentication (MFA)? Read More »

What is Endpoint Detection and Response (EDR)?

What is Endpoint Detection and Response EDR

Endpoint Detection and Response is a technology concept and solution to protect and defend against cyber threats from endpoints such as PCs, laptops, tablets, and smartphones or servers. EDR records the behavior of endpoints and analyzes this data. When suspicious behavior is detected, Endpoint Detection and Response provides automated responses to defend against it, such …

What is Endpoint Detection and Response (EDR)? Read More »

What is Operational Technology (OT)?

What is Operational Technology (OT)?

Operational technology includes software and hardware for monitoring and controlling industrial plants or physical machines and their processes. In the past, these were often proprietary solutions operated in isolated environments. Digitization and the Internet of Things are merging traditional IT with operational technology. This fusion is referred to as IT/OT convergence. What is Operational Technology …

What is Operational Technology (OT)? Read More »

What is MIM?

What is MIM Mobile Information Management

Mobile Information Management (MIM) ensures the secure provision of corporate data on mobile devices. Along with Mobile Device Management (MDM) and Mobile Application Management (MAM), it is another important component of Enterprise Mobility Management. MIM leverages technologies and practices such as encryption, cloud services, sandboxing, containers and others. What is MIM (Mobile Information Management)? The …

What is MIM? Read More »

What is A Computer Worm?

What is a computer worm?

A computer worm is a malware that copies itself and spreads autonomously without needing a host file. Typical propagation paths of the worm are networks or removable media. The malicious functions of the computer worm can be very diverse. What is a computer worm? Like the computer virus or the Trojan, the computer worm belongs …

What is A Computer Worm? Read More »