This website uses cookies to ensure you get the best experience on our website.
Please note that by continuing to use this site you consent to the terms of our Privacy and Data Protection Policy .
Some of our partner services are located in the United States. According to the case law of the European Court of Justice, there is currently no adequate data protection in the USA. There is a risk that your data will be controlled and monitored by US authorities. You cannot bring any effective legal remedies against this.
Accept

Tag: Spotlight on security

Spotlight on security: three reasons why you should select an Android security app with care and caution

security

In 2014 an antivirus program called “Virus Shield” was able to earn over 100.000 dollars in less than 10 days. The only thing this fake security app did was to change its icon color and show a progress bar of an imaginary malware scan. After the scan finished it told the user the device was free of malware. Over 30.000 people downloaded the app and gave it a 5-star rating on Google Play Store. Here are three reasons why you should select an Android security app with care and caution:

Continue reading…

Spotlight on security: New initiatives on IoT security

security

On the 25th of May the European Union will effectuate new legislation on data protection and privacy. Both the General Data Protection Regulation (GDPR) and ePrivacy legislation will have a positive impact on data privacy and security. On top of this new EU legislation, both the British and Dutch government have published statements which will lead to additional regulation on IoT security. Will these initiatives force vendors to improve IoT security for home users in general?

Continue reading…

Spotlight on security: AV-Comparatives was invited to the European Parliament to speak about a safer Internet for children

security

With the United States of America making good progress on minimum Internet-of-Things security, we hoped the European Union was willing to listen to our ideas to fast track existing EU plans and programs. On Monday the 6th of November, we were very pleased to get the opportunity to speak to a Member of the European Parliament, who understands the issues of digitalisation in general, and cybersecurity in particular.

Continue reading…

Spotlight on security: New Windows 10 security features

security

On Tuesday the 17th October, Microsoft started to rollout the ‘Fall Creators Update’ of Windows 10. This second major update in 2017 has some interesting new security features. Microsoft was so generous to give Windows 10 Home users also the added protection of the new Exploit Guard and Controlled folder access. The only catch is that they are built into Windows Defender.

Continue reading…

Spotlight on security: iPhone X introduction – job well done?

security

Did you watch the Apple event? The first ever announcement in the Steve Jobs Theater showed that they miss Steve Jobs. I remember Steve Jobs introducing the NeXTcube. That was a jaw dropping event. The NeXTcube had display depth while the rest of the world used monochrome. It marked the birth of the dock. Combining an application launcher, desktop explorer, and task manager into one single application. So simple straightforward, yet so brilliant and beautiful.

Continue reading…

Spotlight on security: Does Google live up to its promise?

security

In 2007 Google promised to change the world with Android and the Open Handset Alliance: “A new computing environment that will change the way people access and share information in the future. The Android platform will be available under one of the most progressive, developer-friendly open-source licenses to bring to market new innovative products faster and at a much lower cost.

A decade after the announcement we did some fact checking to see whether Google lives up the promises made in the original press release?  

Continue reading…

Spotlight on security: Bob Dylan & Dalai Lama on threats & transparency

security

At first glance the WannaCry and NonPetya outbreaks are no different from the CryptoLocker outbreak of 2015 or the CryptoWall outbreak of 2014. Some of us may even remember the first file-encrypting malware, called PC Cyborg Trojan (aka AIDS Trojan) discovered in 1989. So security insiders may ask themselves in despair: How many fools does it take, to make the same mistake over and over again?

Continue reading…