Privacy and Security Assessment process
Through the PSA process, technical security and data privacy are taken into account early on in...
Internal security in the Deutsche Telekom
Clear responsibility at Management Board level and an integral part of the internal control system as well as relevant supervisory bodies.
Boost your digital immune system.
Finding the unexpected
Alexander Schinner works as an IT forensics expert. He and his team manage the Incident Response Service at Telekom Security, where one of their tasks is to identify and analyze malicious software.
In this episode, we explore a case where a confiscated device revealed more than malware - images of naked children. Together with Alexander Schinner, we explore the background of the story and discuss what IT forensics experts are required to do in such extreme cases.
Still curious? For more stories and...
Ever heard of “Operation Olympic Games” in terms of a cyber attack? Behind this rather friendly name lurks one of the most complex, dangerous and targeted piece of malware ever discovered, causing noticeable harm in real life: Stuxnet.
Because not only criminals hack themselves into computers – also nation states attack each other via software: The worm strategically sabotaged the centrifuges of the Iranian uranium enrichment facility and is the reason why nations today are challenged to not only...