• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      • Gaming & Gambling
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Understanding DoS, DDoS, and DRDoS Attacks: What Every Business Should Know

    Protect your business from DoS, DDoS, and DRDoS attacks. Learn the differences and implement effective defense strategies.

    Reading time:
    7 min
    Published:
    June 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    DDoS, DoS, DRDoS, Angriff
  1. https://www.freepik.com/free-vector/application-programming-interface-concept-illustration_25625375.htm

    Auto-Generating & Validating OpenAPI Docs in Rust: A Streamlined Approach with Utoipa and Schemathesis

    Learn to use OpenAPI documents to improve the quality of your APIs. Learn to integrate Utoipa and Schemathesis into Rust projects.

    Reading time:
    11 min
    Published:
    June 01, 2023
    :
    Fabian Odenthal
    Tags:
    Rust, DevOps, CI
  2. World Password Day 2023 - Current Recommendations

    World Password Day 2023 - Current Recommendations

    World Password Day in May highlights the importance of strong passwords. NIST and BSI recommend passphrases, MFA, and regular checks for compromise.

    Reading time:
    3 min
    Published:
    May 04, 2023
    :
    Rene Neff
    Tags:
    Password, Account Takeover, How to
  3. Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks

    Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks

    Learn about phishing types like pharming (redirection to fake websites) and doc clouding (attackers sharing links while posing as colleagues).

    Reading time:
    5 min
    Published:
    April 28, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  4. Protecting Your Data from Ransomware Attacks: How to Secure Yourself and Your Business

    Protecting Your Data from Ransomware Attacks: How to Secure Yourself and Your Business

    Ransomware attacks are a growing threat. Victims are forced to pay a ransom to decrypt their data. This article outlines protective measures.

    Reading time:
    3 min
    Published:
    April 14, 2023
    Tags:
    Ransomware, Attacks
  5. How to choose a secure password?

    How to choose a secure password?

    This article explains how a strong password protects personal data from unauthorized access and offers tips for choosing a secure password.

    Reading time:
    4 min
    Published:
    March 23, 2023
    Tags:
    Password, How to
  6. Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    In this article we are discussing multifactor authentication. The different kinds will be explained, as well as some examples of possible attacks.

    Reading time:
    6 min
    Published:
    March 02, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MFA, Authentication, Account Takeover, Password
  7. Phishing #3: Smishing, Vishing and Email Clone Phishing

    Phishing #3: Smishing, Vishing and Email Clone Phishing

    We present three types of phishing attacks: smishing, vishing, and email clone phishing. The goal is to obtain information or install malware.

    Reading time:
    5 min
    Published:
    February 22, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  8. Phishing in 2023 - Our Predictions

    Phishing in 2023 - Our Predictions

    Phishing attacks are a major threat in the digital world, including in 2023. Criminals are specializing and using AI for deepfakes and convincing campaigns.

    Reading time:
    3 min
    Published:
    February 08, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, AI, Deepfake, Attacks, Ransomware
  9. Verify Login Credentials to Protect against Credential-Stuffing Attacks

    Verify Login Credentials to Protect against Credential-Stuffing Attacks

    Online platforms must ensure high security standards to protect users from ATO attacks. A specialized service provider offers advantages.

    Reading time:
    8 min
    Published:
    January 31, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Account Takeover, Attacks
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub