Skip to main content
Home
  • Introduction
  • Project
    • Organization Priority Scan
    • Risk assessment
    • Implementation
    • Validation
  • Subscription
  • Services
    • Dienstverlening gemeenten
      • ENSIA Audit & Assurance rapport
      • Nulmeting ENSIA
    • Opleidingen en trainingen
      • Opleiding introductie ISO 27001
      • CISM-opleiding
      • CISSP-opleiding
      • Interne Auditor
      • Developer Security training
    • Security & Risk Management
      • OBE Maatregel / VRKI / SRMBoK
      • ABDO 2017
      • Security Awareness
      • AVG Quick scan
      • ISO/IEC 27001 certification
      • ICT beveiligingsassessment (DigiD)
      • ISMS Creation
      • Creating Data Processing Agreement
      • Opstellen intern beleid meldplicht datalekken
      • Code of conduct creation
      • Creation Privacy Policy
      • Creation privacy statement
      • Quick Scan (Zorg)
      • Quick scan privacy gap
      • Security Audit
      • Baseline Informatiebeveiliging Rijksdienst (BIR)
      • Uitvoeren Privacy Impact Assessment (PIA)
      • Uitvoeren SURFaudit
      • Uitvoeren VECOZO-audit
      • Certificering tegen NEN7512
      • Informatiebeveiliging offshore-installaties TF08
      • VIPP-audit
    • Asset Security
      • Shareloch
    • Security Engineering
      • Advies M.B.T. beleid en implementatie
      • Consult fire prevention
      • Consult theft prevention
    • Communications and Network Security
    • Identity and Access management
      • Advies m.b.t. toegangscontrole
      • Inzetten mystery guest
    • Security assessment and testing
      • Black box test
      • Grey box test
      • White box test
      • Gesimuleerde Phishing Test
      • Kwetsbaarheidsscan
    • Security Operations
      • Data mutation research
      • Security Operations Center (SOC)
    • Software development security
      • Code review
      • Threat modeling
    • Zorg eisen
  • News
  • Blog

Breadcrumb

  1. Home
  2. Security

NSA suspects North Korea of Wannacry attack

Ransomware likely used for financial gain by regime.
  • Security
Read more

Russian hack of US elections larger than expected

Up to 39 states fell victim to hack during elections.
  • Security
Read more

Merkel suggests global legislation for digital world

Current chairwoman for G-20 summit advocates cooperation.
  • Security
Read more

'Yahoo does not want to cooperate in hack-investigations'

According to the German Federal Bureau, Yahoo is not cooperating in research cyber attacks on the company.
  • Security
Read more

FBI-Director James Comey unexpectedly fired

President Trump fires Director on advice given by Justice Department.
  • Security
Read more

New type of ransomware uses Big Mac Index

Price of unlocking files is determined by standard of living.
  • Security
Read more

FBI having difficulty with encryption smartphones

Even standard encryption can sometimes be enough to stop the Bureau.
  • Security
Read more

Australia and China agree on not using cyber espionage

Australia and China have signed a trade agreement.
  • Security
Read more

Eastnets: 'Not hacked by NSA''

Eastnets claimed the company has not been hacked by the NSA.
  • Security
Read more

Cerber ransomware most used ransomware for attacking Windows

Most windows PC's that were attacked with ransomware were hit by Cerber.
  • Security
Read more

Pagination

  • Previous page ‹‹
  • Page 2
  • Next page ››
Subscribe to Security
  • News
  • Blog
Android-apps deleted because ''file-infector''
92 Android-apps have been deleted by Google from the Play store, because they might contain the '...
New ransomware strikes: Bad Rabbit
A new wave of ransomware named Bad Rabbit has struck several organisations in Russia and Ukraine.
FBI:'Vital infrastructure U.S. at risk'
The FBI has warned companies about attacks on the vital infrastructure of the United States.
Software for German elections unsafe
German hacker group warns government about unreliable election software.
View all news
JS/Nemucod.ED!Eldorado – Cerber Ransomware. The JavaScript dropper.
A recent malware has been spotted in the wild, known with the…
View all blog
  • Follow us on LinkedIn
  • linkedin

Copyright © 2016 - 2018 ConanDoyle. All rights reserved.

ConanDoyle BV
Naaldwijkseweg 65
2291 PA  Wateringen

085 - 0606496
SirArthur@conandoyle.eu

Subfooter

  • Home
  • Contact
  • Disclaimer
  • Log in professional
  • Voorwaarden