Brute-Force vs. Argon2: How Secure Are Your Passwords?The 2025 password table from Hive Systems shows: Weak passwords are cracked faster than ever – thanks to the GPU and AI boom. We explain how Argon2 can offer real protection and what users and service providers should keep in mind.
Account takeover and concert ticketsWhat do the world's most famous pop star and account takeovers and data leaks have in common? What does this have to do with platform protection? Find out here!
Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
How much code coverage is enough?Code coverage is an important benchmark for the quality of software tests. But how much coverage really makes sense for your project?
Protection against identity theft through the extension of PHP with Argon2dWith Argon2d in PHP, users are better protected against identity theft. Read about the implementation and how to protect yourself.
The Banshee Information Stealer: The New Threat for MacsA new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.
Phishing #7: Social EngineeringIn this special edition of our phishing series, we explore social engineering. We show how it works in real life and how it can impact the digital world.
Shoulder SurfingWho's looking over your shoulder? In this blog article, we want to talk about a very non-technical way of stealing data: shoulder surfing.
Is old leak data still a problem for my accounts?We explain why older leak data is a security risk, the dangers of forgotten accounts, and why security awareness is important when dealing with old leak data.
Where do you hide your passwords?Why is it always Easter at Identeco? Easter eggs and passwords share one thing: both are hidden and found! Where do you hide your passwords?