Butcher Wechsler and the Hackers

The latest magazine of "Die Mobliliar" focusses on artificial intelligence as well as digitalization - and take a look at cyber crime.

"Er will doch nur spielen" - this is the title of the magazine which Die Mobiliar recently published. It's about artificial intelligence, digitisation, big data, language assistants, e-sports, artificial art and cyber attacks and cyber security.

It tells the story of a butcher's shop whose server was hacked. Late deliveries, lost data, 100 hours of work - the incident cost around 20,000 francs.

But not only SMEs, but also larger companies and government organizations are often insufficiently protected against cyber crime. And the methods of attack are becoming increasingly diverse. Ivan Bütler, co-founder of Compass Security, explains that social engineering is now widespread alongside technical attacks.

 

Read the interesting articles in Die Mobiliar magazine about robots, hackers, enemies on the net, algorithms, games, passwords, etc.

"Metzger Wechsler und die Hacker"

"Er will doch nur spielen"

 

Reference:
Die Mobiliar-Magazin "Er will doch nur spielen", May 2019

CALENDAR

Beer-Talk in St. Gallen: Azure Security 101

Im Sommer 2018 kündigte Microsoft an, ihre Cloud-Lösungen aus Schweizer Rechenzentren anzubieten. Viele hiesige KMUs und Grossunternehmen haben sich... Read more

Swiss Cyber Hackathon 2019 / Zurich

Simulating Real World Cyber Scenarios – Educational Cyber Competition of Defending your Environment and Attacking your Opponents Read more

Internet Security Days 2019 - Game of IT-Security

Based on the theme "Online Security", a wide conference program and an exhibition awaits you on September 26/27, 2019. New in the programme are... Read more

ALL DATES

Compass Security Blog

enOcean Security

In this post, we are going to take a closer look at the enOcean technology, how security is implemented, and if the security measures and options available are sufficient. mehr

Privilege escalation in Windows Domains (3/3)

In this last article about privilege escalation in Windows domains, we demonstrate how to extract credentials from running systems to compromise high-privileged accounts. mehr

ZUM BLOG