War is also subject to the changes of digitalization. In a possible cyberwar, humanitarian and medical actors are to be protected. To this end, there are now several proposals to implement the emblem of the red cross digitally. Why a digital red cross?...
Cyber attacks repeatedly lead to entire companies being paralyzed for days. Here you can find out what you need to know about cybercrime and how you can protect your company with five simple measures. Who does cybercrime affect? Contrary to popular...
It has recently become known that the software library called Log4j has a security vulnerability. This can be exploited very easily to take over entire IT systems or to tap data. Many cybercriminals are now exploiting this, while IT professionals...
Recently, the IT service provider Medatixx was the victim of a cyber attack. The company says it has a market share of more than 28 percent with its software products for medical practices, outpatient clinics and physician networks. The attackers gained access to the...
Technical storage or access is strictly necessary for the lawful purpose of enabling the use of a particular service expressly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a message over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that have not been requested by the subscriber or user.
The technical storage or access, which is carried out exclusively for statistical purposes.Technical storage or access used solely for anonymous statistical purposes. Without a subpoena, the voluntary consent of your Internet service provider, or additional records from third parties, information stored or accessed for this purpose alone generally cannot be used to identify you.
Technical storage or access is necessary to create user profiles, to send advertisements, or to track the user on a website or across multiple websites for similar marketing purposes.