Zum Inhalt springen
  • Security
  • Storage
  • Cloud
  • Aktuell
  • Impressum
  • Datenschutzerklärung

Aktuelle Beiträge

  • (Kein Titel)
  • (Kein Titel)
  • True Costs of a Data-Breach
  • Fallout from Equifax breach will hit banks hardest
  • Ransomware Numbers Continue to Look Abysmal

Neueste Kommentare

Uwe Mönig bei Der deutsche Digitalisierungsd…
Uwe Mönig bei Player, Vorteile und Herausfor…
8 reasons why you sh… bei 8 reasons why you should stren…
Precious bei Player, Vorteile und Herausfor…
digital/anker bei Der deutsche Digitalisierungsd…

Archive

  • April 2019
  • Juli 2018
  • November 2017
  • September 2017
  • August 2017
  • Juli 2017
  • Juni 2017
  • Mai 2017
  • April 2017
  • März 2017
  • Februar 2017
  • Januar 2017
  • Dezember 2016
  • November 2016
  • Oktober 2016
  • September 2016
  • August 2016
  • Juli 2016
  • Juni 2016
  • Mai 2016
  • April 2016
  • März 2016
  • Februar 2016
  • Januar 2016
  • Dezember 2015
  • November 2015
  • Oktober 2015
  • September 2015

Kategorien

  • 3D Print
  • 3D-Druck
  • 4G
  • 5G
  • Active Directory
  • AD
  • AI
  • AI-First
  • Aktuell
  • Alexa
  • Amazon
  • Analytics
  • Android
  • API
  • App Security
  • App Vulnerabilities
  • Application
  • Application Monitoring
  • Application Security
  • APT
  • AR
  • Artificial Intelligence
  • Aruba
  • ATM
  • Attacks
  • Audit
  • Augmented Reality
  • Authentification
  • Automation
  • Avaya
  • Awareness
  • Awareness Training
  • AWS
  • Azure
  • Azure Cosmos DB
  • back door
  • Backdoor
  • Backup
  • Banking
  • Banking Credentials
  • Banking Trojans
  • Behavioral Analytics
  • BI
  • Big Data
  • Bioengineering
  • Biometric Recognition
  • Biometrics
  • Bitcoins
  • Blockchain
  • Boeing
  • Botnet
  • Bots
  • Brute Force Attack
  • Bug
  • Business Analytics
  • Business Continuity
  • Card Breach
  • Cerber
  • Chatbots
  • Check Point
  • Chrome
  • Cisco
  • Cloud
  • Cloud Management
  • Cloud-Computing
  • Cloudsecurity
  • Cloudstorage
  • Collaboration
  • Computer Vulnerabilities
  • Configuration Management
  • Consulting
  • Container
  • Container Orchestration
  • Containerization
  • Cortana
  • Credentials
  • Credit Card Skimming
  • Credit Cards
  • Critical Infrastructure
  • Cyber Defense
  • Cyber Skills
  • Cyber Trap
  • Cyberattack
  • Cyberattacks
  • Cybercrime
  • Cyberinsurance
  • Cyberrisks
  • Cybersecurity
  • Cyberspie
  • Cyberspionage
  • Cybersquatter
  • Cyberthreats
  • Dark Web
  • Darknet
  • Dashbot
  • Data
  • Data Analytics
  • Data Breach
  • Data Center
  • Data Management
  • Data Protection
  • Data Science
  • Data Scientist
  • Data Security
  • Data Visualization
  • Database
  • Databreach
  • Dataleak
  • DDoS
  • Deep Dive
  • Deep Learning
  • Deep Web
  • Desaster Recovery
  • Developers
  • DevOps
  • Digital Signage
  • Digital Transformation
  • Digitalisierung
  • Disney
  • DNS
  • Docker
  • Domain
  • DoS
  • Drohnenabwehr
  • Drones
  • E-Signature
  • ecommerce
  • Education
  • Email
  • Email Security
  • Encryption
  • Enterprise Security
  • Equifax
  • Europol
  • EXTERNALBLUE
  • Facebook
  • Facial Recognition
  • Fake
  • Fatboy
  • Fax
  • FBI
  • FeDex
  • Fileless Ransomware
  • Financial
  • Fintech
  • Flockibot
  • Fortinet
  • Frameworks
  • Fraud
  • Gadget
  • Gaming
  • GDPR
  • Geldautomat
  • Google
  • Google Doc
  • Google Play
  • Government
  • Governmental
  • Hacker
  • Hackers
  • Hacking
  • Hacks
  • Hadoop
  • Healthcare
  • Highly Distributed
  • Homeland Security
  • Hospitality
  • Hotel Network
  • Human Error
  • Hybrid Bots
  • Hybrid-Cloud
  • Hyperconverged
  • Identity Management
  • Identity Theft
  • Imposter Scam
  • Incident Response
  • Infrastructure
  • Insider Threat
  • Insurance
  • Intel
  • Internet der Dinge
  • Internet of Things
  • IOS
  • IoT
  • IoT Security
  • IP Cams
  • IPhone
  • Kubernetes
  • Law
  • Law Firms
  • Linux
  • Locky
  • LTE
  • Mac
  • Machine Learning
  • MacOS
  • Malvertising
  • Malware
  • Malwarebytes
  • Managed Services
  • Marketing
  • Media
  • Messenger
  • Microservices
  • Microsoft
  • Military
  • Militär
  • Mirai
  • Mobile
  • Mobile Apps
  • Mobile Management
  • Mobile Security
  • Mobile Workplace
  • Mobile-First
  • Monitoring
  • MSP
  • MSSP
  • NetApp
  • Netflix
  • Network
  • Network Security
  • NGF
  • NHS
  • Non-Malware
  • NonPetya
  • NoSQL
  • NSA
  • Office
  • Open Source
  • Open Stack
  • Orchestration
  • Password
  • Password Cracking
  • password manager
  • Password Security
  • Patch-Tuesday
  • Patchen
  • PayPal
  • Persirai
  • Petya
  • Phishing Attacks
  • Phising
  • Phone Scams
  • Policy
  • Power Apps
  • Predictive Analytics
  • Princess
  • Privacy
  • RaaS
  • Ransomware
  • Ransomworm
  • real-time
  • Recovery
  • Remote Code Execution
  • Replication
  • Restaurants
  • Retail
  • robocall
  • Robots
  • Router
  • Sabre
  • Safe-Harbor
  • SambaCry
  • SamSam
  • SandBlast
  • Sandbox
  • Scam
  • SD WAN
  • Security
  • Security Flaws
  • Security Threats
  • Serverless Computing
  • SharePoint
  • Siri
  • Skimming
  • Skype
  • Slack
  • SMB
  • SMS Phishing
  • Snapshot
  • Social Engineering
  • Social Media
  • Software
  • Software Frameworks
  • Spam
  • Spambot
  • Spark
  • Splunk
  • Spoofing
  • Spy
  • Spyware
  • Stack Clash
  • Storage
  • Swift
  • Targeted Attacks
  • Third-Party
  • Threat Analysis
  • Threat Intelligence
  • Threats
  • Thunderbird
  • Transportation
  • Traps
  • Travel
  • Trojans
  • Uncategorized
  • USB
  • Varnish
  • Verschiedenes
  • Video
  • Virtual Reality
  • Virtualisierung
  • Virtualization
  • VM
  • VPN
  • VR
  • Vulnerabilities
  • Vulnerability Detection
  • Vulnerability Management
  • WAN
  • WannaCry
  • Wi-Fi
  • Wikileaks
  • Windows
  • Windows XP
  • Wireless
  • WordPress
  • Workflow Management
  • XaaS
  • Zero Day
  • Ztorg

Meta

  • Registrieren
  • Anmelden
  • Feed der Einträge
  • Kommentare-Feed
  • WordPress.com

Aktuelle Beiträge

  • (Kein Titel)
  • (Kein Titel)
  • True Costs of a Data-Breach
  • Fallout from Equifax breach will hit banks hardest
  • Ransomware Numbers Continue to Look Abysmal

Neueste Kommentare

Uwe Mönig bei Der deutsche Digitalisierungsd…
Uwe Mönig bei Player, Vorteile und Herausfor…
8 reasons why you sh… bei 8 reasons why you should stren…
Precious bei Player, Vorteile und Herausfor…
digital/anker bei Der deutsche Digitalisierungsd…

Archive

  • April 2019
  • Juli 2018
  • November 2017
  • September 2017
  • August 2017
  • Juli 2017
  • Juni 2017
  • Mai 2017
  • April 2017
  • März 2017
  • Februar 2017
  • Januar 2017
  • Dezember 2016
  • November 2016
  • Oktober 2016
  • September 2016
  • August 2016
  • Juli 2016
  • Juni 2016
  • Mai 2016
  • April 2016
  • März 2016
  • Februar 2016
  • Januar 2016
  • Dezember 2015
  • November 2015
  • Oktober 2015
  • September 2015

Kategorien

  • 3D Print
  • 3D-Druck
  • 4G
  • 5G
  • Active Directory
  • AD
  • AI
  • AI-First
  • Aktuell
  • Alexa
  • Amazon
  • Analytics
  • Android
  • API
  • App Security
  • App Vulnerabilities
  • Application
  • Application Monitoring
  • Application Security
  • APT
  • AR
  • Artificial Intelligence
  • Aruba
  • ATM
  • Attacks
  • Audit
  • Augmented Reality
  • Authentification
  • Automation
  • Avaya
  • Awareness
  • Awareness Training
  • AWS
  • Azure
  • Azure Cosmos DB
  • back door
  • Backdoor
  • Backup
  • Banking
  • Banking Credentials
  • Banking Trojans
  • Behavioral Analytics
  • BI
  • Big Data
  • Bioengineering
  • Biometric Recognition
  • Biometrics
  • Bitcoins
  • Blockchain
  • Boeing
  • Botnet
  • Bots
  • Brute Force Attack
  • Bug
  • Business Analytics
  • Business Continuity
  • Card Breach
  • Cerber
  • Chatbots
  • Check Point
  • Chrome
  • Cisco
  • Cloud
  • Cloud Management
  • Cloud-Computing
  • Cloudsecurity
  • Cloudstorage
  • Collaboration
  • Computer Vulnerabilities
  • Configuration Management
  • Consulting
  • Container
  • Container Orchestration
  • Containerization
  • Cortana
  • Credentials
  • Credit Card Skimming
  • Credit Cards
  • Critical Infrastructure
  • Cyber Defense
  • Cyber Skills
  • Cyber Trap
  • Cyberattack
  • Cyberattacks
  • Cybercrime
  • Cyberinsurance
  • Cyberrisks
  • Cybersecurity
  • Cyberspie
  • Cyberspionage
  • Cybersquatter
  • Cyberthreats
  • Dark Web
  • Darknet
  • Dashbot
  • Data
  • Data Analytics
  • Data Breach
  • Data Center
  • Data Management
  • Data Protection
  • Data Science
  • Data Scientist
  • Data Security
  • Data Visualization
  • Database
  • Databreach
  • Dataleak
  • DDoS
  • Deep Dive
  • Deep Learning
  • Deep Web
  • Desaster Recovery
  • Developers
  • DevOps
  • Digital Signage
  • Digital Transformation
  • Digitalisierung
  • Disney
  • DNS
  • Docker
  • Domain
  • DoS
  • Drohnenabwehr
  • Drones
  • E-Signature
  • ecommerce
  • Education
  • Email
  • Email Security
  • Encryption
  • Enterprise Security
  • Equifax
  • Europol
  • EXTERNALBLUE
  • Facebook
  • Facial Recognition
  • Fake
  • Fatboy
  • Fax
  • FBI
  • FeDex
  • Fileless Ransomware
  • Financial
  • Fintech
  • Flockibot
  • Fortinet
  • Frameworks
  • Fraud
  • Gadget
  • Gaming
  • GDPR
  • Geldautomat
  • Google
  • Google Doc
  • Google Play
  • Government
  • Governmental
  • Hacker
  • Hackers
  • Hacking
  • Hacks
  • Hadoop
  • Healthcare
  • Highly Distributed
  • Homeland Security
  • Hospitality
  • Hotel Network
  • Human Error
  • Hybrid Bots
  • Hybrid-Cloud
  • Hyperconverged
  • Identity Management
  • Identity Theft
  • Imposter Scam
  • Incident Response
  • Infrastructure
  • Insider Threat
  • Insurance
  • Intel
  • Internet der Dinge
  • Internet of Things
  • IOS
  • IoT
  • IoT Security
  • IP Cams
  • IPhone
  • Kubernetes
  • Law
  • Law Firms
  • Linux
  • Locky
  • LTE
  • Mac
  • Machine Learning
  • MacOS
  • Malvertising
  • Malware
  • Malwarebytes
  • Managed Services
  • Marketing
  • Media
  • Messenger
  • Microservices
  • Microsoft
  • Military
  • Militär
  • Mirai
  • Mobile
  • Mobile Apps
  • Mobile Management
  • Mobile Security
  • Mobile Workplace
  • Mobile-First
  • Monitoring
  • MSP
  • MSSP
  • NetApp
  • Netflix
  • Network
  • Network Security
  • NGF
  • NHS
  • Non-Malware
  • NonPetya
  • NoSQL
  • NSA
  • Office
  • Open Source
  • Open Stack
  • Orchestration
  • Password
  • Password Cracking
  • password manager
  • Password Security
  • Patch-Tuesday
  • Patchen
  • PayPal
  • Persirai
  • Petya
  • Phishing Attacks
  • Phising
  • Phone Scams
  • Policy
  • Power Apps
  • Predictive Analytics
  • Princess
  • Privacy
  • RaaS
  • Ransomware
  • Ransomworm
  • real-time
  • Recovery
  • Remote Code Execution
  • Replication
  • Restaurants
  • Retail
  • robocall
  • Robots
  • Router
  • Sabre
  • Safe-Harbor
  • SambaCry
  • SamSam
  • SandBlast
  • Sandbox
  • Scam
  • SD WAN
  • Security
  • Security Flaws
  • Security Threats
  • Serverless Computing
  • SharePoint
  • Siri
  • Skimming
  • Skype
  • Slack
  • SMB
  • SMS Phishing
  • Snapshot
  • Social Engineering
  • Social Media
  • Software
  • Software Frameworks
  • Spam
  • Spambot
  • Spark
  • Splunk
  • Spoofing
  • Spy
  • Spyware
  • Stack Clash
  • Storage
  • Swift
  • Targeted Attacks
  • Third-Party
  • Threat Analysis
  • Threat Intelligence
  • Threats
  • Thunderbird
  • Transportation
  • Traps
  • Travel
  • Trojans
  • Uncategorized
  • USB
  • Varnish
  • Verschiedenes
  • Video
  • Virtual Reality
  • Virtualisierung
  • Virtualization
  • VM
  • VPN
  • VR
  • Vulnerabilities
  • Vulnerability Detection
  • Vulnerability Management
  • WAN
  • WannaCry
  • Wi-Fi
  • Wikileaks
  • Windows
  • Windows XP
  • Wireless
  • WordPress
  • Workflow Management
  • XaaS
  • Zero Day
  • Ztorg

Meta

  • Registrieren
  • Anmelden
  • Feed der Einträge
  • Kommentare-Feed
  • WordPress.com

SECURITY & CLOUD IT

Menü
Widgets
Suchen

Skype

Skype reintroduces some features lost after the previous Android and iOS updates

Quelle: Skype reintroduces some features lost after the previous Android and iOS updates

Juli 17, 2017Uwe Mönig Hinterlasse einen Kommentar

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Flashpoint published the paper ‚Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies‘ about cybercriminal communications of bad actors.

Quelle: Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

April 23, 2017Uwe Mönig Hinterlasse einen Kommentar

Cybercriminals prefer to chat over Skype

Cybercriminals don’t operate in the Dark Web only; they also rely on popular communications software such as Skype, WhatsApp, Jabber, and Signal

Quelle: Cybercriminals prefer to chat over Skype

April 20, 2017Uwe Mönig Hinterlasse einen Kommentar
Bloggen auf WordPress.com.
Datenschutz & Cookies: Diese Website verwendet Cookies. Wenn du die Website weiterhin nutzt, stimmst du der Verwendung von Cookies zu.
Weitere Informationen, beispielsweise zur Kontrolle von Cookies, findest du hier: Cookie-Richtlinie