Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • About Us
  • Blog
  • Contact
  1. How to choose a secure password?

    How to choose a secure password?

    A strong password is important to protect our accounts and data from unauthorised access. Hackers and criminals can exploit vulnerabilities in our passwords to gain access to our accounts, steal our personal information and cause direct or indirect financial damage. If a criminal cracks your password, they may be able to access your personal information, including your address information, banking information, national insurance number, credit card information and more. In addition, hackers may be able to use your password to send spam emails from your account, infecting you or your contacts with malware.

    Reading Time:
    4 min
    Published:
    March 23, 2023
    Tags:
    password
  2. Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    Multifactor authentication (MFA) is a method of increasing the security of online services that uses multiple factors to verify a user’s identity. There are three basic factors used in authentication: knowledge, possession and biometrics. Knowledge-Based Procedure The knowledge-based method verifies what the user knows. An example of this type of multi-factor authentication is the use of so-called “Knowledge-Based Authentication” (KBA) questions. Here, the user must answer a series of personal questions during registration, the answers to which only he or she should know.

    Reading Time:
    6 min
    Published:
    March 02, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MFA, Authentication
  3. Phishing, what is it actually? (Part 3)

    Phishing, what is it actually? (Part 3)

    Phishing is a form of cyber attack in which attackers attempt to trick users into revealing sensitive information by pretending being a trusted source. There are different variants of phishing. In this blog post, we present three specific types of phishing: Smishing, Vishing and Email Clone Phishing. It thus continues our series on phishing: Phishing, What Is It All About? (Part 1) und Phishing, What Is It All About? (Part 2).

    Reading Time:
    5 min
    Published:
    February 22, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing
  4. Phishing in 2023 - Our Predictions

    Phishing in 2023 - Our Predictions

    Phishing attacks are one of the biggest threats in the digital world and a steady increase has been observed for years. It is likely that this will continue in 2023. Here are some predictions of what we expect to see in 2023 in the context of phishing attacks. Increase in Ransomware Incidents Phishing attacks are usually the first step to deploy ransomware into corporate infrastructures. The insidious malware spreads in the internal network and then encrypts critical business data.

    Reading Time:
    3 min
    Published:
    February 08, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, AI, Deepfake
  5. Verify Login Credentials to Protect against Credential-Stuffing Attacks

    Verify Login Credentials to Protect against Credential-Stuffing Attacks

    Users to Verify Their Login Credentials to Protect against Credential-Stuffing Attacks Checking credentials against leaked login information is an important safeguard to protect against credential stuffing attacks, as it helps prevent the use of stolen credentials. When users check their credentials on a platform that matches whether the data has been leaked in the past, they can determine whether their credentials may have already fallen into the hands of attackers. If so, they should change their password as soon as possible and, if necessary, consider other security measures such as enabling two-factor authentication.

    Reading Time:
    8 min
    Published:
    January 31, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Account Takeover
  6. Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Risks to Users of Online Platforms from Credential-Stuffing Attacks Credential stuffing attacks pose a high risk for users of online platforms. Criminals’ access to online accounts can lead to financial damage, for example when purchasing goods with stolen credit cards or by exploiting access data to paid offers. Credential-stuffing attacks also pose a risk of identity theft, as attackers may have access to personal information and documents when they access an account.

    Reading Time:
    4 min
    Published:
    January 26, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Password
  7. Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential stuffing attacks are a cyber attack type in which attackers attempt to use credentials obtained through data leaks and other means on various online platforms. In these attacks, automated scripts are used to try out the credentials at high speed on many of these portals. If credentials are correct, attackers can usually fully access and abuse a legitimate user’s account. The stolen credentials are often gathered in so-called collections and traded by criminals on the dark and deep web.

    Reading Time:
    2 min
    Published:
    January 24, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing
  8. A screenshot of the command `git log`. One can see three commit messages: '💚 Adopt hadolint suggestions', '🚀 Pull base images on build', '⬆️  Upgrade dependencies'

    Fast and User Friendly: Our Alternative to Gitmoji

    In the world of software development, it is important to document changes to projects quickly and efficiently. One way to do this is to add emojis to commit messages to quickly identify the nature of the changes. A well-known and popular tool that we like to use at Identeco is gitmoji. But what if you’re a programmer and want to work even faster and realize the meaning of emojis more quickly in the context of Semantic Versioning?

    Reading Time:
    3 min
    Published:
    January 17, 2023
    :
    Pascua Theus
    Tags:
    Tool, DevOps
  9. Dark Web vs. Deep Web - What can you find there?

    Dark Web vs. Deep Web - What can you find there?

    Many have heard of the Dark Web, as it is often depicted in movies and books. But what exactly is it? The regular Internet that people use in their everyday lives belongs to the so-called “Surface Web” and accounts for only 10% of the total amount of data on the World Wide Web. The Deep Web can be thought of as an intermediate layer between the Surface Web and the Dark Web.

    Reading Time:
    4 min
    Published:
    January 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Deep Web, Dark Web
  10. How often should you change your passwords?

    How often should you change your passwords?

    Always and nearly everywhere you are told how to choose a secure password: Upper and lower case letters, numbers and special characters, no variations of already existing passwords and in no case use a password more than once. After you have chosen your password appropriately, the only question that remains is: how often you should change your passwords. Originally, a regular password change several times a year was recommended, often every three months.

    Reading Time:
    4 min
    Published:
    December 07, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Password
  • Previous
  • 1
  • 2
  • Next
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • Twitter
  • YouTube
  • GitHub