Choose your language:
  • Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • About Us
  • Blog
  • Contact
    • Our Team for Your Security

      Our employees ensure more account security on the Internet.

    • Press & Media

      Find current press releases, information on events and publications.

    • Write Us a Message

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • Twitter
      • YouTube
      • GitHub
    Malware #1: Malware, Virus and Worm

    Malware #1: Malware, Virus and Worm

    We are starting a new blog series, in which we will introduce the different types of malware and give an example of an attack for each case. In the first part of the "Malware" series, we explain what malware actually is and how it differs from viruses and worms.

    Reading time:
    3 min
    Published:
    September 29, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Malware, Angriff, DDoS, Virus, Worm
  1. Effects of Account Takeover

    Effects of Account Takeover

    From fictitious cell phone contracts, hacked Ebay accounts, hijacked Twitter profiles and attacked company accounts. Identity theft has many faces! We regularly discuss how this can happen in our blog. In this article, we want to shed some light on the possible consequences of account takeover in a non-technical way.

    Reading time:
    5 min
    Published:
    September 15, 2023
    :
    Frank Zickenheiner
    Tags:
    Account Takeover
  2. The invisible threat: How stealer malware steals your information

    The invisible threat: How stealer malware steals your information

    Our article takes a look into the world of stealer malware - hidden digital thieves that copy sensitive data. We shed light on how it works and the origins of an infection with this malware. Finally, we'll go into proven defensive measures. Learn how you can protect yourself and your business against the invisible threats from cyberspace.

    Reading time:
    2 min
    Published:
    August 25, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Stealer Malware, Malware, Angriff, Account Takeover
  3. ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    Identeco launches with ProSBAcT! From the first of June 2023 ProSBAacT, a joint project of Identeco and the funding initiative StartUp Secure of the Federal Ministry of Education and Research will run. At this point, we would like to report briefly on what we plan to do with ProSBAcT and how we benefit from working with ProSBAcT.

    Reading time:
    3 min
    Published:
    August 04, 2023
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    Phishing, Angriff, Account Takeover
  4. Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Our blog series on phishing attacks continues. Learn about malvertising, HTTPS phishing and Evil Twin attacks. We explain not only how such attacks happen, but also how you can protect yourself against them.

    Reading time:
    6 min
    Published:
    July 28, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attack, Account Takeover
  5. Hogwarts and email accounts: lessons for the Muggle world

    Hogwarts and email accounts: lessons for the Muggle world

    The magical world of Harry Potter is all about spells, magical artefacts and passwords. In our, digitalized Muggle world, passwords also play an increasingly important role. In this article, we want to look at similarities and differences between passwords in Harry Potter, passwords in the muggle world and personal identification numbers (PIN).

    Reading time:
    5 min
    Published:
    July 07, 2023
    :
    Aura Pop , Frank Zickenheiner & Rene Neff
    Tags:
    PIN, Passwort
  6. Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-middle attacks, nowadays also called machine-in-the-middle attacks, are attacks where the direct connection to a website or service is redirected by an attacker in such a way that he can read the user's input and thus gain access to their accounts. In this blog, you will learn not only how this happens, but also how you can protect yourself from it.

    Reading time:
    5 min
    Published:
    June 27, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MitM, Angriff, Account Takeover
  7. Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Protect your business from DoS, DDoS, and DRDoS attacks. Learn the differences, understand the technical background, and implement effective mitigation strategies to safeguard your network and account access.

    Reading time:
    7 min
    Published:
    June 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    DDoS, DoS, DRDoS, Angriff
  8. https://www.freepik.com/free-vector/application-programming-interface-concept-illustration_25625375.htm

    Auto-Generating & Validating OpenAPI Docs in Rust: A Streamlined Approach with Utoipa and Schemathesis

    Learn how to automatically generate and validate OpenAPI docs to ensure accuracy and reliability throughout the lifecycle of your API. Discover a real-world example and integrate powerful tools like Utoipa and Schemathesis into your Rust projects and CI pipelines.

    Reading time:
    11 min
    Published:
    June 01, 2023
    :
    Fabian Odenthal
    Tags:
    Rust, DevOps, CI
  9. World Password Day 2023 - Current Recommendations

    World Password Day 2023 - Current Recommendations

    World Password Day on the first Thursday in May is a reminder of the importance of strong passwords and proven best practices. NIST and BSI recommend passphrases, MFA and regular checks for compromise. We explain tips for choosing strong passwords and handling account details in our article.

    Reading time:
    3 min
    Published:
    May 04, 2023
    :
    Rene Neff
    Tags:
    Password, Account Takeover, How to
  • Previous
  • 1
  • 2
  • 3
  • Next
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • Twitter
  • YouTube
  • GitHub