info@smidcloud.com
  • Facebook
  • Twitter
  • RSS
  • Facebook
  • Twitter
  • RSS
  • dudas al Zweifel
  • Deutsch
    • Español
    • English
    • Deutsch
SMiD Cloud, secure encryption solutions
  • Startseite
  • So funktioniert´s
  • Lösungen
    • SMiD Pro
  • Services
  • Partner
  • Kontaktdaten
Seite wählen
KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

KRACK Attack: How Wi-Fi networks are at risk and what you can do to protect your information

von Smidcloud | Okt 30, 2017 | Cybersecurity breaches and incidents

The KRACK (Key Reinstallation) attack takes advantage of a security flaw found in the WPA2 protocol.  This is the protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi can exploit these weaknesses using KRACK; this...
Cyberattacks, Cyberterrorism or Cyberwar

Cyberattacks, Cyberterrorism or Cyberwar

von Smidcloud | Sep 25, 2017 | Cybersecurity breaches and incidents

News about computer incidents, cyberattacks and hackers appear every day in the media, but which were the first? How did it all start? We are going to review when cyberattacks began, how they have evolved and clarify the terms used. Violence is a complex concept and...
Ransomware and how to fight it

Ransomware and how to fight it

von Smidcloud | Sep 12, 2017 | Cybersecurity breaches and incidents

The business of ransom is not new[1], it is based on hijacking or holding back something of value to someone and then asking for a ransom for it. In the case of Ransomware what is hijacked is the digital information we have in the devices to which the attackers gain...
Stealing cars, easier than ever

Stealing cars, easier than ever

von Smidcloud | Jun 7, 2017 | Cybersecurity breaches and incidents

Today’s modern world’s digital technology has not only made our lives easier but it has also provided abusers an opportunity to exploit and take advantage of the loopholes in the security system of any such technological systems. Use of electronic devices to unlock...
Worst Cyber data breaches in 21st Century and how they could be prevented (Part 2)

Worst Cyber data breaches in 21st Century and how they could be prevented (Part 2)

von Smidcloud | Jan 25, 2017 | Cybersecurity breaches and incidents

It is time to continue with the review of the biggest cyber-attacks and data breaches of the 21st Century and what could have been done to prevent them. You will find more cases of the worst security breaches of 21st century in the part 1 of this article.  6. NASA...
Worst Cyber Data Breaches in 21st Century and How They Could be Prevented (Part 1)

Worst Cyber Data Breaches in 21st Century and How They Could be Prevented (Part 1)

von Smidcloud | Jan 9, 2017 | Cybersecurity breaches and incidents

Cyber-attacks are as old as the advent of cyberspace. When the technology was new and cyber security had yet to gain its due importance, the cyber attackers took full advantage of its vulnerabilities and caused damage in millions. With time, the technology grew...
« Ältere Einträge
Nächste Einträge »
  • Facebook
  • Google
  • LinkedIn
  • Twitter
  • YouTube
  • RSS

Designed by Elegant Themes | Powered by WordPress