Skip to main content
Home
  • Introduction
  • Project
    • Organization Priority Scan
    • Risk assessment
    • Implementation
    • Validation
  • Subscription
  • Services
    • Dienstverlening gemeenten
      • ENSIA Audit & Assurance rapport
      • Nulmeting ENSIA
    • Opleidingen en trainingen
      • Opleiding introductie ISO 27001
      • CISM-opleiding
      • CISSP-opleiding
      • Interne Auditor
      • Developer Security training
    • Security & Risk Management
      • OBE Maatregel / VRKI / SRMBoK
      • ABDO 2017
      • Security Awareness
      • AVG Quick scan
      • ISO/IEC 27001 certification
      • ICT beveiligingsassessment (DigiD)
      • ISMS Creation
      • Creating Data Processing Agreement
      • Opstellen intern beleid meldplicht datalekken
      • Code of conduct creation
      • Creation Privacy Policy
      • Creation privacy statement
      • Quick Scan (Zorg)
      • Quick scan privacy gap
      • Security Audit
      • Baseline Informatiebeveiliging Rijksdienst (BIR)
      • Uitvoeren Privacy Impact Assessment (PIA)
      • Uitvoeren SURFaudit
      • Uitvoeren VECOZO-audit
      • Certificering tegen NEN7512
      • Informatiebeveiliging offshore-installaties TF08
      • VIPP-audit
    • Asset Security
      • Shareloch
    • Security Engineering
      • Advies M.B.T. beleid en implementatie
      • Consult fire prevention
      • Consult theft prevention
    • Communications and Network Security
    • Identity and Access management
      • Advies m.b.t. toegangscontrole
      • Inzetten mystery guest
    • Security assessment and testing
      • Black box test
      • Grey box test
      • White box test
      • Gesimuleerde Phishing Test
      • Kwetsbaarheidsscan
    • Security Operations
      • Data mutation research
      • Security Operations Center (SOC)
    • Software development security
      • Code review
      • Threat modeling
    • Zorg eisen
  • News
  • Blog

Breadcrumb

  1. Home
  2. Security

Billions gone through cyber attacks on investors

Since 2013, 43 billion pounds have disappeared through cyber attacks and data leaks.
  • Security
Read more

Microsoft Office leaks solved

The leak in Microsoft Office has been solved by the company.
  • Security
Read more

Large security breach in Microsoft Office

A very serious security breach has been found in Microsoft Office software.
  • Security
Read more

Alarm Dallas activated by cyber attackers

The alarm was activated in the night of Friday on Saturday.
  • Security
Read more

Cloudproviders used to hack organizations all over the world

A group of hackers has used several providers of cloud services to break into other organizations.
  • Security
Read more

Researcher unhappy about security Samsung software.

The operating system of Samsung, Tizen, contains many vulnerabilities according to a researcher.
  • Security
Read more

Network Providers U.S. may now sell browser history

Because of new privacy rules, provides can now legally sell data of their internet users.
  • Security
Read more

Apple target of hacking group

Last week, a group of hackers threatened Apple.
  • Security
Read more

Cisco discovers vulnerabilities in software through Wikileaks

The company discovered leaks in its own software through Wikileaks documents.
  • Security
Read more

Software of big companies hacked in 48 hours

During a hacking contest, frequently used software was hacked quickly.
  • Security
Read more

Pagination

  • Previous page ‹‹
  • Page 3
  • Next page ››
Subscribe to Security
  • News
  • Blog
Android-apps deleted because ''file-infector''
92 Android-apps have been deleted by Google from the Play store, because they might contain the '...
New ransomware strikes: Bad Rabbit
A new wave of ransomware named Bad Rabbit has struck several organisations in Russia and Ukraine.
FBI:'Vital infrastructure U.S. at risk'
The FBI has warned companies about attacks on the vital infrastructure of the United States.
Software for German elections unsafe
German hacker group warns government about unreliable election software.
View all news
JS/Nemucod.ED!Eldorado – Cerber Ransomware. The JavaScript dropper.
A recent malware has been spotted in the wild, known with the…
View all blog
  • Follow us on LinkedIn
  • linkedin

Copyright © 2016 - 2018 ConanDoyle. All rights reserved.

ConanDoyle BV
Naaldwijkseweg 65
2291 PA  Wateringen

085 - 0606496
SirArthur@conandoyle.eu

Subfooter

  • Home
  • Contact
  • Disclaimer
  • Log in professional
  • Voorwaarden