• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      • Gaming & Gambling
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    A Pentest for Identeco

    A Pentest for Identeco

    The Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.

    Reading time:
    4 min
    Published:
    March 21, 2024
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    IT Security, Cyber Attack, Pentest, Code Audit
  1. The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"

    The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"

    We clarify how consumers can tell if they've been victims of a data leak and compare "Have I been pwned?" with German alternatives.

    Reading time:
    9 min
    Published:
    February 21, 2024
    :
    Frank Zickenheiner
    Tags:
    Data Breach, Leak Checker
  2. Phishing #6: Spearphishing, Watering-Hole Attack and Whaling Attacks

    Phishing #6: Spearphishing, Watering-Hole Attack and Whaling Attacks

    Discover the dangers of spearphishing, watering hole, and whaling. Learn how these phishing methods work and how to spot them.

    Reading time:
    5 min
    Published:
    December 01, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Angriff, Account Takeover
  3. Malware #1: Malware, Virus and Worm

    Malware #1: Malware, Virus and Worm

    We are starting a blog series on malware. In the first part, we explain what malware is and the difference between viruses and worms.

    Reading time:
    3 min
    Published:
    September 29, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Malware, Angriff, DDoS, Virus, Worm
  4. Effects of Account Takeover

    Effects of Account Takeover

    Identity theft appears in fake contracts and hijacked accounts. We highlight the non-technical consequences of account takeover.

    Reading time:
    6 min
    Published:
    September 15, 2023
    :
    Frank Zickenheiner
    Tags:
    Account Takeover
  5. The invisible threat: How stealer malware steals your information

    The invisible threat: How stealer malware steals your information

    Our article explains stealer malware, which steals sensitive data. We explore its operation, infection origins, and provide tips on defense measures.

    Reading time:
    2 min
    Published:
    August 25, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Stealer Malware, Malware, Angriff, Account Takeover
  6. ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    Starting in June 2023, the project ProSBAcT begins with StartUp Secure of the FMER. We share goals, collaborations, and how ProSBAcT enriches our work.

    Reading time:
    3 min
    Published:
    August 04, 2023
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    Phishing, Angriff, Account Takeover
  7. Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Our blog series on phishing continues. Learn about malvertising, HTTPS phishing, and Evil Twin, as well as how to protect yourself from these attacks.

    Reading time:
    6 min
    Published:
    July 28, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attack, Account Takeover
  8. Hogwarts and email accounts: lessons for the Muggle world

    Hogwarts and email accounts: lessons for the Muggle world

    In Harry Potter, spells and passwords play a role. In the digital world, passwords are becoming more important. We compare these aspects.

    Reading time:
    5 min
    Published:
    July 07, 2023
    :
    Aura Pop , Frank Zickenheiner & Rene Neff
    Tags:
    PIN, Passwort
  9. Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-middle attacks redirect connections to a website to eavesdrop on user input. Learn how to protect yourself.

    Reading time:
    5 min
    Published:
    June 27, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MitM, Angriff, Account Takeover
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub