The invisible threat: How stealer malware steals your information
Our article takes a look into the world of stealer malware - hidden digital thieves that copy sensitive data. We shed light on how it works and the origins of an infection with this malware. Finally, we'll go into proven defensive measures. Learn how you can protect yourself and your business against the invisible threats from cyberspace.
Hogwarts and email accounts: lessons for the Muggle world
The magical world of Harry Potter is all about spells, magical artefacts and passwords. In our, digitalized Muggle world, passwords also play an increasingly important role. In this article, we want to look at similarities and differences between passwords in Harry Potter, passwords in the muggle world and personal identification numbers (PIN).
Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?
Man-in-the-middle attacks, nowadays also called machine-in-the-middle attacks, are attacks where the direct connection to a website or service is redirected by an attacker in such a way that he can read the user's input and thus gain access to their accounts. In this blog, you will learn not only how this happens, but also how you can protect yourself from it.
Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks
Phishing attacks can occur in everyday internet life. Pharming redirects the user to a fake website, often via a pop-up window. In doc clouding, attackers pretend to be colleagues and share links, e.g. in comments. In this article you will learn more about these types of attacks.
Phishing in 2023 - Our Predictions
Phishing attacks are among the biggest threats in the digital world. 2023 will be no exception. We describe how criminals are becoming more specialised and how the latest tools, supported by AI, are being used for deepfake and extraordinarily convincing phishing campaigns.