Due to misconfigurations of Git repositories attackers could easily access your databases.

Very important to check: Due to misconfigurations of Git repositories attackers could easily access your databases.

According to “Die Zeit” and “c’t” it´s not just smaller organizations but also DAX companies, governmental agencies and universities that had this issue as about 41k systems were identified to be at risk.

https://lnkd.in/dmssz_k

Android

It´s not only about services and servers: Take good care of your mobile devices!

Most companies offer at least some of their employees company smartphones. Today not only sales and management positions need to work with smart devices, but let´s take it from here: Imagine a very well protected IT environment within the company network while managers use smartphones without any specific protection or secured access to applications as outlook.

Referring to yesterday´s news there are some critical weakpoints in Android OS that should be fixed with the patchlevel 2020-07-01 or 2020-07-05 (https://lnkd.in/gZPDNvS)

Consider checking your own version from time to time and if you´re responsible for IT security don´t miss to expand your protection to smart devices.

The 4 types of computer viruses

Certainly there are too many special and different viruses to know them all, but let us try to get a typification for the most common ones:

1. Perform operations on PC
– e.g. encrypt or delete data
– boot virus (you can´t log in to your OS anymore)
– Execute commands

2. Physical attack: Hardware takes damage from a virus
– Manipulate the hard drive firmware
– USB and other connections are deactivated
– Manipulate temperature controls of CPU, burning the motherboard

3. Hijacking: Hackers use the processing power and storage of your device
– Virus disconnects you from the internet
– PC is used within hacker botnets
– Unwanted applications are installed to show you ads

4. Spying: Probably the most dangerous type
– Hackers spy passwords and logins so they can steal your identity and access company networks and data
– Record and track users´ forbidden or undesirable activities for blackmailing
– Take over control via e.g. remote desktop

Do you miss any important category? Have you been experiencing one of these?