• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"

    The Leak Checker of the University of Bonn: a German alternative to "Have I been pwned?"

    We are often asked how consumers can recognise data leaks. The service "Have I been pwned?" is often mentioned, which raises the question of European or German alternatives. In this blog post, we would like to clarify these questions: What is a leak checker, what is "Have I been pwned?", what German alternatives are there and what does the University of Bonn's leak checker offer?

    Reading time:
    9 min
    Published:
    February 21, 2024
    :
    Frank Zickenheiner
    Tags:
    Data Breach, Leak Checker, Account Security
  1. Phishing #6: Spearphishing, Watering-Hole Attack and Whaling Attacks

    Phishing #6: Spearphishing, Watering-Hole Attack and Whaling Attacks

    Discover the dangers of spearphishing, watering hole and whaling attacks in our new blog post. From personalized attacks to compromising trusted websites - we show you how these phishing methods work and how you can recognize them.

    Reading time:
    5 min
    Published:
    December 01, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Angriff, Account Takeover
  2. Malware #1: Malware, Virus and Worm

    Malware #1: Malware, Virus and Worm

    We are starting a new blog series, in which we will introduce the different types of malware and give an example of an attack for each case. In the first part of the "Malware" series, we explain what malware actually is and how it differs from viruses and worms.

    Reading time:
    3 min
    Published:
    September 29, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Malware, Angriff, DDoS, Virus, Worm
  3. Effects of Account Takeover

    Effects of Account Takeover

    From fictitious cell phone contracts, hacked Ebay accounts, hijacked Twitter profiles and attacked company accounts. Identity theft has many faces! We regularly discuss how this can happen in our blog. In this article, we want to shed some light on the possible consequences of account takeover in a non-technical way.

    Reading time:
    6 min
    Published:
    September 15, 2023
    :
    Frank Zickenheiner
    Tags:
    Account Takeover
  4. The invisible threat: How stealer malware steals your information

    The invisible threat: How stealer malware steals your information

    Our article takes a look into the world of stealer malware - hidden digital thieves that copy sensitive data. We shed light on how it works and the origins of an infection with this malware. Finally, we'll go into proven defensive measures. Learn how you can protect yourself and your business against the invisible threats from cyberspace.

    Reading time:
    2 min
    Published:
    August 25, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Stealer Malware, Malware, Angriff, Account Takeover
  5. ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account Takeovers

    Identeco launches with ProSBAcT! From the first of June 2023 ProSBAacT, a joint project of Identeco and the funding initiative StartUp Secure of the Federal Ministry of Education and Research will run. At this point, we would like to report briefly on what we plan to do with ProSBAcT and how we benefit from working with ProSBAcT.

    Reading time:
    3 min
    Published:
    August 04, 2023
    :
    Frank Zickenheiner & Rene Neff
    Tags:
    Phishing, Angriff, Account Takeover
  6. Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Phishing #5: Malvertising, Https-Phishing und Evil Twin

    Our blog series on phishing attacks continues. Learn about malvertising, HTTPS phishing and Evil Twin attacks. We explain not only how such attacks happen, but also how you can protect yourself against them.

    Reading time:
    6 min
    Published:
    July 28, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Cyber Attack, Account Takeover
  7. Hogwarts and email accounts: lessons for the Muggle world

    Hogwarts and email accounts: lessons for the Muggle world

    The magical world of Harry Potter is all about spells, magical artefacts and passwords. In our, digitalized Muggle world, passwords also play an increasingly important role. In this article, we want to look at similarities and differences between passwords in Harry Potter, passwords in the muggle world and personal identification numbers (PIN).

    Reading time:
    5 min
    Published:
    July 07, 2023
    :
    Aura Pop , Frank Zickenheiner & Rene Neff
    Tags:
    PIN, Passwort
  8. Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-Middle Attacks: How do you protect yourself from the invisible threat?

    Man-in-the-middle attacks, nowadays also called machine-in-the-middle attacks, are attacks where the direct connection to a website or service is redirected by an attacker in such a way that he can read the user's input and thus gain access to their accounts. In this blog, you will learn not only how this happens, but also how you can protect yourself from it.

    Reading time:
    5 min
    Published:
    June 27, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MitM, Angriff, Account Takeover
  9. Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Protect your business from DoS, DDoS, and DRDoS attacks. Learn the differences, understand the technical background, and implement effective mitigation strategies to safeguard your network and account access.

    Reading time:
    7 min
    Published:
    June 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    DDoS, DoS, DRDoS, Angriff
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub