Effects of Account Takeover
From fictitious cell phone contracts, hacked Ebay accounts, hijacked Twitter profiles and attacked company accounts. Identity theft has many faces! We regularly discuss how this can happen in our blog. In this article, we want to shed some light on the possible consequences of account takeover in a non-technical way.
The invisible threat: How stealer malware steals your information
Our article takes a look into the world of stealer malware - hidden digital thieves that copy sensitive data. We shed light on how it works and the origins of an infection with this malware. Finally, we'll go into proven defensive measures. Learn how you can protect yourself and your business against the invisible threats from cyberspace.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers
Identeco launches with ProSBAcT! From the first of June 2023 ProSBAacT, a joint project of Identeco and the funding initiative StartUp Secure of the Federal Ministry of Education and Research will run. At this point, we would like to report briefly on what we plan to do with ProSBAcT and how we benefit from working with ProSBAcT.
Hogwarts and email accounts: lessons for the Muggle world
The magical world of Harry Potter is all about spells, magical artefacts and passwords. In our, digitalized Muggle world, passwords also play an increasingly important role. In this article, we want to look at similarities and differences between passwords in Harry Potter, passwords in the muggle world and personal identification numbers (PIN).
Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?
Man-in-the-middle attacks, nowadays also called machine-in-the-middle attacks, are attacks where the direct connection to a website or service is redirected by an attacker in such a way that he can read the user's input and thus gain access to their accounts. In this blog, you will learn not only how this happens, but also how you can protect yourself from it.
Auto-Generating & Validating OpenAPI Docs in Rust: A Streamlined Approach with Utoipa and Schemathesis
Learn how to automatically generate and validate OpenAPI docs to ensure accuracy and reliability throughout the lifecycle of your API. Discover a real-world example and integrate powerful tools like Utoipa and Schemathesis into your Rust projects and CI pipelines.
World Password Day 2023 - Current Recommendations
World Password Day on the first Thursday in May is a reminder of the importance of strong passwords and proven best practices. NIST and BSI recommend passphrases, MFA and regular checks for compromise. We explain tips for choosing strong passwords and handling account details in our article.