Category: Blog

Emotet: From a Banking Trojan to One of the Most Advanced Botnets

In 2014, the Emotet malware started as a banking Trojan targeting European bank customers. Back then, nobody expected this malware would evolve into one of the most dangerous botnets in the world. We’ve been getting a lot of questions about the Emotet malware and its eponymous botnet, as its versatility

Emotet: Von einem Bank-Trojaner zu einem der fortgeschrittensten Botnets

2014 begann die Emotet-Malware als Bank-Trojaner, der europäische Bankkunden ins Visier nahm. Damals erwartete niemand, dass sich diese Malware zu einem der gefährlichsten Botnets weltweit entwickeln würde. Uns haben viele Fragen zur Emotet-Malware und dem gleichnamigen Botnet erreicht. Seine Vielseitigkeit hat dazu geführt, dass es weit verbreitet ist (eine Analyse

Exciting New Way to Authenticate on Android 7 phones & Resilient is Ready!

Resilient Network Systems believes FIDO2/WebAuthN has the potential to dramatically improve the security and privacy of identity on the web, while dramatically simplifying the user’s task of registering and authenticating their identity.  WebAuthN became an official WC3 Standard today, March 4, 2019, and FIDO2 is achieving broad industry endorsement and support

Compliant Productivity: Embracing “Millennial” Communication Tools While Maintaining Compliance

From employee communication apps like Slack to personal text messages, today’s organizations rely on modern tech for all aspects of their workplace productivity. This shift in how businesses communicate requires a shift in how businesses achieve compliant productivity. More than 40% of Fortune 100 companies today use Slack for internal collaboration and communication. Within these companies, dozens

Ransomware Overshadowed by Phishing, But It’s Not Dead Yet

According to several recent surveys, phishing may have surpassed ransomware as the top concern for IT and security managers, and there may not be a single ransomware out there to capture the collective imagination like Locky did in 2016, but don’t be misled—ransomware continues alive and well. Recent targeted Ryuk

Ransomware von Phishing übertroffen, aber noch nicht ganz ausgemerzt

Mehreren jüngsten Umfragen zufolge hat Phishing Ransomware als größtes Sicherheitsproblem für IT- und Sicherheitsmanager übertroffen. Keine einzige Ransomware steht so im kollektiven Bewusstsein wie Locky im Jahr 2016. Aber lassen Sie sich nicht täuschen: Ransomware geht es weiterhin allzu gut. Jüngste zielgerichtete Ryuk-Angriffe haben Unternehmen verstärkt ins Visier genommen, wie

Data Classification Fail: Data Stolen at Apple Car

Confidentiality Oaths and Stolen Secrets As Bloomberg first reported, an Apple Inc. engineer has been charged with stealing data from the company that contained car secrets for a prototype driverless car. Jizhong Chen had been working for Apple for about six months, signing a strict confidentiality oath upon being hired.  According to another Apple

Buying Email Security for Office 365 Has Gotten Harder

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, driven by two major trends

Opt-In or Opt-Out: Which Route Should Your Organization Go?

The General Data Protection Act (GDPR) launched a worldwide conversation on data security and consumer data protections. As historical data breaches continue to happen on a way-too-frequent basis, and data privacy legislation expands across the globe, companies are taking a harder look at their privacy policies and their obligations under each