Mobile Security

Security anywhere and on the move

The ECS2, a cloud-based IT security system, filters your entire data stream on your mobile end devices both at home and on the move – independent of the operating system and depending on the provider does so even without the installation of extra software or apps.

SMART HOME SECURITY

Protection of all devices and your privacy

The internet has already captured all areas of one’s private life. Daily use meanwhile goes way beyond shopping or online banking – the Internet of Things integrates web-enabled television sets, gaming consoles, Bluray players, door locking devices, heating and even fridges in our households.

BUSINESS SECURITY

Cutting-edge protection against all risks

The Internet has opened up the opportunity to many small and medium-sized companies to compete with large corporations on the international market as well. However when it comes to the area of IT security such companies are often left standing due to lacking resources.

ENTERPRISE SECURITY

Global Networks need an extended protection to face the new challenges

The development of cloud computing as well as the Internet of Things is changing the IT landscape more significantly than any innovation in the past 20 years. Resources are being transformed in the direction of an innovative structure and method of operation.

Elastic Cloud Security System

News

CYBERCRIME

Hard Rock Hotel & Casino Las Vegas reports a malware attack allowed hackers to steal credit card information used at its retail and service locations:

http://bit.ly/1c3PdQ4

Wednesday, 13.05.2015

INTERNET OF THINGS

CloudSense wants to connect every devices with the internet and can let you know if you left your garage door open, if your appliance is on or off and how much water you’re using. With these developments, the Data-Security should play a major role:

http://tcrn.ch/1zpJ3E2


Friday, 08.05.2015

CYBERCRIME
Google’s Malaysian site has been hacked and replaced with a splash screen giving credit to a group called “Team Madleets".

http://tcrn.ch/1IIea0v

Wednesday, 15.04.2015

CYBERCRIME
Lately large enterprises became victims of DDoS attacks. But what are DDoS attacks and how do they work? Here is a short introduction:
 

Tuesday, 07.04.2015

CYBERCRIME
Gangs of cybercriminals in South Korea and Japan are now using advanced Android apps that can steal private data and record conversations for sex extortion:
 
http://bit.ly/1bwCncA

Wednesday, 01.04.2015

CYBERCRIME
11 Mio. Data affected: Hack of Premera indicates that medical data will be a major topic among cyber security.

http://wapo.st/1ChfZOc

Thursday, 26.03.2015

CYBERCRIME
Target has to pay $10 Mio. for leaking 40 Mio. debit and credit card account information...

http://nbcnews.to/1ExlkR9

Monday, 23.03.2015