Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Malware

Writing person on the laption

4 min read

Protect your company from spyware with our 7 tips

In today's digital era, we are more dependent on technology than ever before, but this dependence comes with risks. One of the underestimated threats...

Read More
Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

Cyberattacks are a persistent hazard, and adware is among the most frequent types of malware devices encounter. Adware isn't just an annoyance that...

Read More
Woman sitting in front of hacked computer

4 min read

Man in the Middle Attack Example: How It Works

An increased reliance on technology comes the growing risk of cyber threats, one of the most dangerous being Man-in-the-Middle (MITM) attacks. A MITM...

Read More
Person browsing a dark net

13 min read

The Dangers and Benefits of Using the Dark Web

The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....

Read More
Supply chain management process on the tablet

4 min read

Guarding Your Business: How to Defend Against Supply Chain Attacks

Businesses find themselves constantly on guard against a wide array of cyber threats. Among these, one formidable adversary stands out for its covert...

Read More
A code blocked by a lock

9 min read

From Myth to Malware: The Evolution of Trojan Horse Viruses

In the vast landscape of cybersecurity threats, few adversaries have proven as cunning and adaptable as the Trojan horse virus. Like its namesake...

Read More
Green computer code

8 min read

10 Strategies to Protect Against Malware Attacks

The threat of malware looms large. From viruses and worms to ransomware and spyware, malicious software poses a significant risk to individuals,...

Read More
open, red lock on the dark blue background

11 min read

15 different types of cyberattacks

In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...

Read More
Wooden dices with news sign on them

2 min read

2021.1 DriveLock release offers many improvements and enhancements

Our first release in 2021 introduces many new features and gives our customers and interested parties an outlook on where we are heading with...

Read More
Woman in glasses looking at the code

7 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post "Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More