window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Cybersecurity

A C D G I N S
  • Apple ID mutiert zum Apple Account

Apple ID mutates into Apple Account – A step with hidden intentions?

2024-03-24T13:31:00+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Apple ID mutates into Apple Account - Apple changes its strategy: Apparently, the US company is about to make a huge move by significantly changing its Apple ID. Not a marketing gag but, as always, a significant strategic move by Apple Starting this fall, Apple plans to convert the Apple ID into the Apple Account. This is definitely not a marketing gimmick. Nor is this a frivolous decision, but rather one that the company has prepared very carefully, as always. Apple stands for innovation and continuous improvement of the user experience. With the planned changeover from the "Apple ID" to the "Apple Account", the company is signaling its continued commitment to user-friendliness and data protection.

  • Cyberangriff auf Microsoft

Cyberattack on Microsoft – Fact-based analysis of the attack vectors

2024-01-22T19:50:34+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cyberattack on Microsoft - Fact-based analysis of the attack vectors. The most recent example of a sophisticated cyberattack is the cyberattack on Microsoft. This new IT hack on widely used standard software proves how vulnerable even leading technology companies with advanced security systems can be. Cyberattacks such as the one on Microsoft infrastructures are exemplary and must be regarded as a generally valid call for proactive protection in favor of robust cybersecurity architectures due to the widespread use of software solutions.

  • Digitale Diskretion und das Echo um Taurus im Cyberspace

Digital discretion and the echo around Taurus in cyberspace

2024-03-05T00:18:16+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

How the Taurus scandal exposed the weaknesses in our cyber security. Our article not only offers an authentic insight into the events surrounding the Bundeswehr wiretapping incident, but also focuses on a responsible approach. Find out now why robust IT security measures and Auguste Kerckhoff's century-old principles are more relevant than ever in our digital era. We provide valuable insights and solutions to strengthen digital security in an increasingly networked world. Discover with us how transparency, integrity and a progressive error culture pave the way to a safer future.

  • Ghostbusters Attack - Facebooks Geheimkrieg & Lausch-Attacken

Ghostbusters cyber attack – Facebook’s secret war & eavesdropping attacks

2024-03-28T11:39:04+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Snapchat users eavesdropped on by a man-in-the-middle attack by Facebook - Facebook has probably deliberately bypassed Snapchat encryption. As part of a class action lawsuit against Facebook, documents have now been made public that once again provide explosive material in the Facebook scandal surrounding data protection and data sovereignty. Facebook's action against Snapchat was probably more aggressive than ever thought.

  • IT Standards - Warum Interoperabilität und Sicherheit unverzichtbar sind

IT standards – Why interoperability and security are essential

2024-02-24T18:19:09+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

IT standards are the invisible network that ensures security, enables interoperability and holds our digital landscape together. Without IT standards, we would fall back into an era of digital turbulence in which nothing communicates with each other, security gaps are omnipresent and no progress is possible. Today we dive into the world of IT standards - we explore why they are essential, what makes a good standard and how they shape our digital future.

  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

  • v.l.n.r.: Christiane Fritsch, Luise Kranich, Thomas Lohninger, Uwe Kraus, Anja Lehmann, Peter Parycek, Brian Behlendorf, Torsten Loddersteddt, Ulrich Weinberg, Ariane Jäger - copyright Felix Adler

SPRIND prototyping competition for digital wallets

2024-05-30T18:29:28+02:00Categories: Prototyping|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the first nomination round of the prototyping competition in SPRIND's EUDI Wallet Prototypes innovation competition, 6 teams were nominated. A remarkable milestone for digital identities and an efficient approach to developing digital technologies. This competition clearly differs from traditional public tenders due to its prototypical approach and emphasizes the importance of agile and user-centric software applications.

Go to Top