Account takeover and concert ticketsWhat do the world's most famous pop star and account takeovers and data leaks have in common? What does this have to do with platform protection? Find out here!
Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
How much code coverage is enough?Code coverage is an important benchmark for the quality of software tests. But how much coverage really makes sense for your project?
Protection against identity theft through the extension of PHP with Argon2dWith Argon2d in PHP, users are better protected against identity theft. Read about the implementation and how to protect yourself.
The Banshee Information Stealer: The New Threat for MacsA new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.
Phishing #7: Social EngineeringIn this special edition of our phishing series, we explore social engineering. We show how it works in real life and how it can impact the digital world.
Shoulder SurfingWho's looking over your shoulder? In this blog article, we want to talk about a very non-technical way of stealing data: shoulder surfing.
Is old leak data still a problem for my accounts?We explain why older leak data is a security risk, the dangers of forgotten accounts, and why security awareness is important when dealing with old leak data.
Where do you hide your passwords?Why is it always Easter at Identeco? Easter eggs and passwords share one thing: both are hidden and found! Where do you hide your passwords?
A Pentest for IdentecoThe Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.