Blog Cyber Security

01.19.2023 10:30 am

The metaverse – a place full of opportunities and threats

The term “metaverse” first appeared in 1992 in a dystopian novel entitled “Snow Crash” by US science fiction author Neal Stephenson. In the book, the metaverse – think roleplaying crossed with multiplayer online gaming – represents a virtual place of refuge for the protagonists who are struggling to make their way through an apocalyptic world. An early […]

Show Post ›
01.05.2023 10:30 am

Beware! Cleverly disguised cryptomining malware is on the rise

The “mining” of cryptocurrencies, i.e., creating new currency units and validating transactions in the blockchain, is associated with a very high level of technical sophistication. To perform the complex processing operations at the required speed – in other words, the hash rate – the hardware used (powerful CPUs, GPUs or specialized ASIC boards) is either […]

Show Post ›
12.22.2022 10:26 am

Illegal software downloads as bait for malware programs

High-quality software has its price – although many users aren’t prepared to pay it. A BSA study conducted in 2017 found that around 20 percent of software in Germany was unlicensed. While Germany is far from being a global leader in software piracy – the corresponding figure was 66 percent in China and 62 percent in […]

Show Post ›
06.15.2022 12:35 pm

The new macOS 13 beta is coming – approach with caution!

There’s no PC or Mac user on the planet who wouldn’t be curious about the new features the latest release of their favourite operating system has to offer. For the Mac community, the recently staged Worldwide Developers Conference (WWDC) 2022 provided some facts to stir this curiosity even further. It seems that the newly christened […]

Show Post ›
06.07.2022 12:35 pm

Cross-platform malware “Gimmick” is also attacking Apple users

A group of Chinese cyber-criminals are operating under the name “Storm Cloud” and threat analysts are concerned by their extraordinary skills. This was the opinion of American cyber security company Volexity which was the first to discover malware developed by Storm Cloud that was previously unknown but is “highly developed with a lot of varied […]

Show Post ›
05.23.2022 12:05 pm

Like lions in the savannah: A watering hole attack on macs

By Candid Wüst “Watering hole attacks” are among the most perfidious of attack strategies: Like lions at a watering hole on the African savannah, cyber-criminals hide behind pages previously infected with malware that are visited frequently or are highly likely to be visited by the target group of the attack. The particular risk of this […]

Show Post ›
04.22.2022 11:58 am

The most common reasons for losing data: there are many ways to doom

Using widespread surveys, Acronis regularly records how individuals and companies handle their digital data. The picture they paint is not particularly rosy; neglecting data backups tends to be the rule rather than the exception for both user groups. In the most recent survey fully 68% of private users admitted that they have lost data due […]

Show Post ›
04.20.2022 08:30 am

Menacing Crash Landing Instead of Soaring Career Opportunity

Above-average salaries, varied tasks, and excellent career opportunities make Lockheed Martin Corporation one of the most attractive employers in the United States. So, if a job offer from the sought-after employer lands in someone’s personal inbox, only a few of those chosen to receive the email would refrain from taking a look at it. This […]

Show Post ›
04.11.2022 11:30 am

Acronis stops all activities in Russia

Alongside most of humanity we at Acronis are also outraged and deeply concerned by the Russian attack on Ukraine. We support the people in this country fighting for its freedom and call for peace to return to the region. At the same time we have joined the sanctions that have been imposed and are stopping […]

Show Post ›
04.07.2022 10:37 am

On the differences between toasters and mass storage – some backup issues

Mass storage and toasters have one thing in common: they break down occasionally. But if such an issue befalls your toaster it at worst results in a less tasty breakfast, but the consequences of a hard drive or SSD crash can be incomparably more dramatic. In the very worst case scenario irreplaceable data is lost […]

Show Post ›