A Pentest for IdentecoThe Identeco solutions were subjected to a penetration test. Reason enough to talk about security tests, penetration tests and code audits.
The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"We clarify how consumers can tell if they've been victims of a data leak and compare "Have I been pwned?" with German alternatives.
Phishing #6: Spearphishing, Watering-Hole Attack and Whaling AttacksDiscover the dangers of spearphishing, watering hole, and whaling. Learn how these phishing methods work and how to spot them.
Malware #1: Malware, Virus and WormWe are starting a blog series on malware. In the first part, we explain what malware is and the difference between viruses and worms.
Effects of Account TakeoverIdentity theft appears in fake contracts and hijacked accounts. We highlight the non-technical consequences of account takeover.
The invisible threat: How stealer malware steals your informationOur article explains stealer malware, which steals sensitive data. We explore its operation, infection origins, and provide tips on defense measures.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account TakeoversStarting in June 2023, the project ProSBAcT begins with StartUp Secure of the FMER. We share goals, collaborations, and how ProSBAcT enriches our work.
Phishing #5: Malvertising, Https-Phishing und Evil TwinOur blog series on phishing continues. Learn about malvertising, HTTPS phishing, and Evil Twin, as well as how to protect yourself from these attacks.
Hogwarts and email accounts: lessons for the Muggle worldIn Harry Potter, spells and passwords play a role. In the digital world, passwords are becoming more important. We compare these aspects.
Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?Man-in-the-middle attacks redirect connections to a website to eavesdrop on user input. Learn how to protect yourself.