Last year all records for cyber threats detected were broken. They exceeded 62.6 billion, a figure that represents an increase of 20% compared to 2019. These data derive from the annual report by Trend Micro, a company specializing in cloud security.
Google and The Linux Foundation have reached an agreement to improve Linux security. The search engine will allocate funds to finance the work of two kernel developers to focus on tasks aimed at shielding the system.
Today is the European Data Protection Day. A date established by the European Commission, the Council of Europe and the Data Protection authorities of the member states of the European Union to raise awareness about the importance of privacy and user data protection. At a time when technology has become an indispensable engine to guarantee the continuity of most businesses, it is worth reflecting on the suitability of the solutions we are using to work remotely from the security perspective. Desktop virtualization has emerged as the best bet for keeping computer systems, sensitive information and user data properly shielded.
When there are only a few days left to say goodbye to this unusual year, we have compiled the Top 5 of the most read articles in our blog in 2020. As you may know, we strive to keep our readers up-to-date with the most outstanding news about virtualization in general, desktop and application virtualization in particular, Open Source technologies, and announcements, news, and case studies with UDS Enterprise, our software for VDI, vApp and remote access to physical and virtual machines.
A new side channel attack threatens Intel and AMD CPUs. It has been discovered by a group of Austrian researchers from the Graz University of Technology. They have called it PLATYPUS and it allows exploiting variations in processor power consumption to access confidential data. One of the characteristics that differentiate this attack from other similar ones is that it does not require physical access to the server, desktop or laptop.
The protection of computer networks against unauthorized access is one of the main handicaps of cybersecurity. It is essential for both system administrators of large corporations and IT managers of small and medium-sized companies, even to protect home networks. In any of these cases personal data and sensitive information are at stake, whose value is priceless.
In this article we are going to talk about two Open Source tools with all the necessary ingredients to become your best allies to protect your networks from both external attacks and possible human errors: Apache Syncope and Apache Metron.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.