Account takeover and concert ticketsWhat do the world's most famous pop star and account takeovers and data leaks have in common? What does this have to do with platform protection? Find out here!
The Banshee Information Stealer: The New Threat for MacsA new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.
Shoulder SurfingWho's looking over your shoulder? In this blog article, we want to talk about a very non-technical way of stealing data: shoulder surfing.
Is old leak data still a problem for my accounts?We explain why older leak data is a security risk, the dangers of forgotten accounts, and why security awareness is important when dealing with old leak data.
Where do you hide your passwords?Why is it always Easter at Identeco? Easter eggs and passwords share one thing: both are hidden and found! Where do you hide your passwords?
A Pentest for IdentecoThe Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.
The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"We clarify how consumers can tell if they've been victims of a data leak and compare "Have I been pwned?" with German alternatives.
Effects of Account TakeoverIdentity theft appears in fake contracts and hijacked accounts. We highlight the non-technical consequences of account takeover.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account TakeoversStarting in June 2023, the project ProSBAcT begins with StartUp Secure of the FMER. We share goals, collaborations, and how ProSBAcT enriches our work.
Hogwarts and email accounts: lessons for the Muggle worldIn Harry Potter, spells and passwords play a role. In the digital world, passwords are becoming more important. We compare these aspects.