The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]
Did you ever check the strength of your password or if it was leaked on the Dark Web? How long it will it take to brute force your password or download it in file from the Dark Web? If you don’t want to think about that, please choose your subscription on https://idcontrol.pw!
The Multi-year Plan for Improving Central Government Information Management prescribes that all government organizations must implement a method of e-mail archiving by 2021, whereby this applies in In principle, all e-mail from officials is kept for a period of ten years. After that period, the e-mails are either destroyed or transferred to the National Archives. […]
Encro’s servers running in France were hacked thanks to the special knowledge of the Dutch Team High Tech Crime.This allowed detectives to read about all the criminal activities planned in the Netherlands and far beyond. EncroChat has discontinued its services as a provider of encrypted communication. The company supplied crypto phones internationally that allowed users […]
More and more digital cyber resilience services are being outsourced to large foreign tech companies. According to the researchers at the Rathenau Institute , the Netherlands and Europe are losing as a result. control and say over data. These problems can be reduced by encrypting sensitive data by default, by making stricter requirements. suppliers and […]
The security of routers for end users leaves something to be desired. The devices are full of known vulnerabilities, often use hard-coded passwords and do not receive security updates for a long time, according to research by the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE. 127 routers from seven major suppliers were investigated […]
An ICT company that installed the network without a firewall, external backups and strong authentication on the RPD service has been convicted by the court. The judgment stated that this assignment was not properly carried out and that two thirds of the damage, namely more than 10,000 Euro, and the legal costs must be reimbursed […]
The European Union Agency for Cybersecurity shares its recommendations for improving the security of passwords and authentication methods. If you have questions about Single Sign-On, Password & Multi-factor authentication Management, please check out the EU’s Nr 1 Password Cloud, please call +31 888 SECURE (732873)!