The invisible threat: How stealer malware steals your information
Our article takes a look into the world of stealer malware - hidden digital thieves that copy sensitive data. We shed light on how it works and the origins of an infection with this malware. Finally, we'll go into proven defensive measures. Learn how you can protect yourself and your business against the invisible threats from cyberspace.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers
Identeco launches with ProSBAcT! From the first of June 2023 ProSBAacT, a joint project of Identeco and the funding initiative StartUp Secure of the Federal Ministry of Education and Research will run. At this point, we would like to report briefly on what we plan to do with ProSBAcT and how we benefit from working with ProSBAcT.
Hogwarts and email accounts: lessons for the Muggle world
The magical world of Harry Potter is all about spells, magical artefacts and passwords. In our, digitalized Muggle world, passwords also play an increasingly important role. In this article, we want to look at similarities and differences between passwords in Harry Potter, passwords in the muggle world and personal identification numbers (PIN).
Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?
Man-in-the-middle attacks, nowadays also called machine-in-the-middle attacks, are attacks where the direct connection to a website or service is redirected by an attacker in such a way that he can read the user's input and thus gain access to their accounts. In this blog, you will learn not only how this happens, but also how you can protect yourself from it.
World Password Day 2023 - Current Recommendations
World Password Day on the first Thursday in May is a reminder of the importance of strong passwords and proven best practices. NIST and BSI recommend passphrases, MFA and regular checks for compromise. We explain tips for choosing strong passwords and handling account details in our article.
Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks
Phishing attacks can occur in everyday internet life. Pharming redirects the user to a fake website, often via a pop-up window. In doc clouding, attackers pretend to be colleagues and share links, e.g. in comments. In this article you will learn more about these types of attacks.
Phishing in 2023 - Our Predictions
Phishing attacks are among the biggest threats in the digital world. 2023 will be no exception. We describe how criminals are becoming more specialised and how the latest tools, supported by AI, are being used for deepfake and extraordinarily convincing phishing campaigns.
Verify Login Credentials to Protect against Credential-Stuffing Attacks
To protect users from account takeover attacks, online platforms must ensure an appropriate level of security. A specialized service provider that checks login information against known leak data offers significant advantages over individual checking by each user.