Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.

Security gaps in the home office? The challenge of IT security in times of crisis

Security gaps in the home office? The challenge of IT security in times of crisis

The number of coronavirus infections are increasing each day, which has resulted in drastic countermeasures. Shops, restaurants and other public places are staying closed to prevent the spread of the virus. Companies are asking their employees to work from their homes. During this extraordinary and sometimes overwhelming situation, companies and employees should not have to face additional fears about IT security in the home office. Hornetsecurity has some recommendations for this.
Office 365- is ‘Account Hijacking’ the number 1 security risk?

Office 365- is ‘Account Hijacking’ the number 1 security risk?

Microsoft is considered as the major driver of the cloud movement and has brought the world’s most used office suite into the cloud with Office 365. But users of the cloud service are more and more in the centre of cybercriminal activities. Most recently, Microsoft reported a 250 percent increase in targeted attacks on Office 365 accounts. The technology company integrated various security mechanisms to defend against malware and other threats. But are these really sufficient for comprehensive security?
Formjacking – The New Invisible Threat in Cyberspace

Formjacking – The New Invisible Threat in Cyberspace

Christmas is just around the corner and it is already certain that some people will lose their holiday spirit. When millions of people go online on a gift hunt, the trap snaps shut. We are talking about the new invisible threat on the Internet: Formjacking, also known as e-skimming. Hackers are stealing credit card and bank details from online shops with hijacked payment forms…
The age of information: What makes your data so valuable?

The age of information: What makes your data so valuable?

Are you aware of your “data value”? In the case of a data leak in the IT systems of multinational companies, it is often reported that the damage amounts to billions. Data has even become one of the most valuable resources in the world. However, a calculator that allows users to determine the overall value of their data leaves a completely different impression: the “price” for the information provided by users is always less than one dollar. But how is this possible and is it even possible to specifically calculate the value of this “resource”?
The future of encryption technology? Quantum computers and post-quantum cryptography explained

The future of encryption technology? Quantum computers and post-quantum cryptography explained

A revolution in the computer industry? A quantum computer uses the laws of quantum physics and is therefore much more powerful and faster than our known private and commercial computers. The technology could not only bring about a global change in medicine and communication – the commercial use of such a computer would also have an enormous influence on IT security.