• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    Account takeover and concert tickets

    Account takeover and concert tickets

    What do the world's most famous pop star and account takeovers and data leaks have in common? What does this have to do with platform protection? Find out here!

    Reading time:
    6 min
    Published:
    April 30, 2025
    :
    Frank Zickenheiner
    Tags:
    Account Takeover, Phishing, Credential Stuffing, Datensicherheit
  1. Stealer logs: How hackers gain access to vehicle functions through stolen login data

    Stealer logs: How hackers gain access to vehicle functions through stolen login data

    Together with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.

    Reading time:
    7 min
    Published:
    December 09, 2024
    :
    Rene Neff
    Tags:
    Stealer, Account Takeover, Leak Data, Stealer Malware, MFA, Attacks, Password
  2. How much code coverage is enough?

    How much code coverage is enough?

    Code coverage is an important benchmark for the quality of software tests. But how much coverage really makes sense for your project?

    Reading time:
    6 min
    Published:
    November 14, 2024
    :
    Pascua Theus & Fabian Odenthal
    Tags:
    Code Coverage, Software Testing, DevOps
  3. Protection against identity theft through the extension of PHP with Argon2d

    Protection against identity theft through the extension of PHP with Argon2d

    By extending PHP with Argon2d, users and service providers can now be even better protected actively and preventively against identity theft on the Internet. Read more about the implementation and the dangers of identity theft in this blog article and find out how you can protect yourself and your users against it.

    Reading time:
    12 min
    Published:
    September 26, 2024
    :
    Leo Schmidt & Rene Neff
    Tags:
    Identity theft, Memory-hard, Hash function, Argon2d, PHP
  4. The Banshee Information Stealer: The New Threat for Macs

    The Banshee Information Stealer: The New Threat for Macs

    A new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.

    Reading time:
    7 min
    Published:
    August 23, 2024
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    Stealer, Banshee
  5. Phishing #7: Social Engineering

    Phishing #7: Social Engineering

    In this special edition of our phishing series, we want to show how social engineering works in real life and how it can also affect the digital world.

    Reading time:
    5 min
    Published:
    August 16, 2024
    :
    Aura Pop & Rene Neff
    Tags:
    Account Takeover, Phishing
  6. Shoulder Surfing

    Shoulder Surfing

    Who's looking over your shoulder? In this blog article, we want to talk about a very non-technical way of stealing data: shoulder surfing.

    Reading time:
    10 min
    Published:
    August 07, 2024
    :
    Frank Zickenheiner
    Tags:
    Shoulder Surfing, Data security
  7. Is old leak data still a problem for my accounts?

    Is old leak data still a problem for my accounts?

    We explain why older leak data is a security risk, the dangers of forgotten accounts, and why security awareness is important when dealing with old leak data.

    Reading time:
    7 min
    Published:
    April 08, 2024
    :
    Frank Zickenheiner
    Tags:
    Leak data, Data security
  8. Where do you hide your passwords?

    Where do you hide your passwords?

    Why is it always Easter at Identeco? And what do Easter eggs and passwords have in common? Sure: both Easter eggs and passwords are hidden - and found! But where do you hide your passwords?

    Reading time:
    6 min
    Published:
    March 28, 2024
    :
    Frank Zickenheiner
    Tags:
    Easter, Data security
  9. A Pentest for Identeco

    A Pentest for Identeco

    The Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.

    Reading time:
    4 min
    Published:
    March 21, 2024
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    IT Security, Cyber Attack, Pentest, Code Audit
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub