Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
Protection against identity theft through the extension of PHP with Argon2dWith Argon2d in PHP, users are better protected against identity theft. Read about the implementation and how to protect yourself.
The Banshee Information Stealer: The New Threat for MacsA new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.
Phishing #7: Social EngineeringIn this special edition of our phishing series, we explore social engineering. We show how it works in real life and how it can impact the digital world.
A Pentest for IdentecoThe Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.
Phishing #6: Spearphishing, Watering-Hole Attack and Whaling AttacksDiscover the dangers of spearphishing, watering hole, and whaling. Learn how these phishing methods work and how to spot them.
Malware #1: Malware, Virus and WormWe are starting a blog series on malware. In the first part, we explain what malware is and the difference between viruses and worms.
The invisible threat: How stealer malware steals your informationOur article explains stealer malware, which steals sensitive data. We explore its operation, infection origins, and provide tips on defense measures.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account TakeoversStarting in June 2023, the project ProSBAcT begins with StartUp Secure of the FMER. We share goals, collaborations, and how ProSBAcT enriches our work.
Phishing #5: Malvertising, Https-Phishing und Evil TwinOur blog series on phishing continues. Learn about malvertising, HTTPS phishing, and Evil Twin, as well as how to protect yourself from these attacks.
Hogwarts and email accounts: lessons for the Muggle worldIn Harry Potter, spells and passwords play a role. In the digital world, passwords are becoming more important. We compare these aspects.
Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?Man-in-the-middle attacks redirect connections to a website to eavesdrop on user input. Learn how to protect yourself.
Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should KnowProtect your business from DoS, DDoS, and DRDoS attacks. Learn the differences and implement effective defense strategies.
World Password Day 2023 - Current RecommendationsWorld Password Day in May highlights the importance of strong passwords. NIST and BSI recommend passphrases, MFA, and regular checks for compromise.
Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding AttacksLearn about phishing types like pharming (redirection to fake websites) and doc clouding (attackers sharing links while posing as colleagues).
Multifactor Authentication (MFA): Only as strong as the weakest link in the chainIn this article we are discussing multifactor authentication. The different kinds will be explained, as well as some examples of possible attacks.
Phishing #3: Smishing, Vishing and Email Clone PhishingWe present three types of phishing attacks: smishing, vishing, and email clone phishing. The goal is to obtain information or install malware.
Phishing in 2023 - Our PredictionsPhishing attacks are a major threat in the digital world, including in 2023. Criminals are specializing and using AI for deepfakes and convincing campaigns.
Verify Login Credentials to Protect against Credential-Stuffing AttacksOnline platforms must ensure high security standards to protect users from ATO attacks. A specialized service provider offers advantages.
Risks to Users and Operators of Online Platforms from Credential-Stuffing AttacksCredential stuffing attacks threaten the security of users and platform operators. This article explains the causes and risks for users and platform operators.
Credential Stuffing: A Threat to Online Platforms and Their UsersCredential stuffing with leaked login data threatens web portals. Service providers offer secure solutions through regular checks for leaked credentials.
Dark Web vs. Deep Web - What can you find there?Ordinary users rarely encounter the deep or dark web, but dangers lurk in the depths of the internet. How do these areas differ from the regular web?
How often should you change your passwords?After choosing the right password, the question arises if and how often you should change your passwords.
Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing AttacksIn this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.
Phishing #1: Email Phishing, Baiting and Search Engine PhishingAs the start of a series, this first article introduces email phishing, baiting, and search engine phishing, showing how users are deceived.