• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    https://www.freepik.com/free-vector/application-programming-interface-concept-illustration_25625375.htm

    Auto-Generating & Validating OpenAPI Docs in Rust: A Streamlined Approach with Utoipa and Schemathesis

    Learn how to automatically generate and validate OpenAPI docs to ensure accuracy and reliability throughout the lifecycle of your API. Discover a real-world example and integrate powerful tools like Utoipa and Schemathesis into your Rust projects and CI pipelines.

    Reading time:
    11 min
    Published:
    June 01, 2023
    :
    Fabian Odenthal
    Tags:
    Rust, DevOps, CI
  1. World Password Day 2023 - Current Recommendations

    World Password Day 2023 - Current Recommendations

    World Password Day on the first Thursday in May is a reminder of the importance of strong passwords and proven best practices. NIST and BSI recommend passphrases, MFA and regular checks for compromise. We explain tips for choosing strong passwords and handling account details in our article.

    Reading time:
    3 min
    Published:
    May 04, 2023
    :
    Rene Neff
    Tags:
    Password, Account Takeover, How to
  2. Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks

    Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding Attacks

    Phishing attacks can occur in everyday internet life. Pharming redirects the user to a fake website, often via a pop-up window. In doc clouding, attackers pretend to be colleagues and share links, e.g. in comments. In this article you will learn more about these types of attacks.

    Reading time:
    5 min
    Published:
    April 28, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  3. Protecting Your Data from Ransomware Attacks: How to Secure Yourself and Your Business

    Protecting Your Data from Ransomware Attacks: How to Secure Yourself and Your Business

    Ransomware attacks are an increasing threat. Victims are forced to pay a ransom in order to decrypt the data. This article explains protective measures to prevent attacks and minimise damage.

    Reading time:
    3 min
    Published:
    April 14, 2023
    Tags:
    Ransomware, Attacks
  4. How to choose a secure password?

    How to choose a secure password?

    A strong password is a fundamental part of online security. It is the key to your personal information and accounts. In this article, you will learn how to choose a strong password and why it is so important.

    Reading time:
    4 min
    Published:
    March 23, 2023
    Tags:
    Password, How to
  5. Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    Multifactor Authentication (MFA): Only as strong as the weakest link in the chain

    In this article we are discussing multifactor authentication. The different kinds will be explained (knowledge, possesion, biometric and inherence), as well as some examples of possible attacks.

    Reading time:
    6 min
    Published:
    March 02, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    MFA, Authentication, Account Takeover, Password
  6. Phishing #3: Smishing, Vishing and Email Clone Phishing

    Phishing #3: Smishing, Vishing and Email Clone Phishing

    Introduction of three types of phishing attacks: Smishing (SMS scam), Vishing (phone scam) and Email Clone Phishing (imitation of legitimate emails). The goal is to trick users into revealing information or installing malware.

    Reading time:
    5 min
    Published:
    February 22, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  7. Phishing in 2023 - Our Predictions

    Phishing in 2023 - Our Predictions

    Phishing attacks are among the biggest threats in the digital world. 2023 will be no exception. We describe how criminals are becoming more specialised and how the latest tools, supported by AI, are being used for deepfake and extraordinarily convincing phishing campaigns.

    Reading time:
    3 min
    Published:
    February 08, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, AI, Deepfake, Cyber Attack, Ransomware
  8. Verify Login Credentials to Protect against Credential-Stuffing Attacks

    Verify Login Credentials to Protect against Credential-Stuffing Attacks

    To protect users from account takeover attacks, online platforms must ensure an appropriate level of security. A specialized service provider that checks login information against known leak data offers significant advantages over individual checking by each user.

    Reading time:
    8 min
    Published:
    January 31, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Account Takeover, Attacks
  9. Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Credential stuffing attacks threaten the security of users and operators of online platforms. This article explains causes and risks for users and platform operators.

    Reading time:
    4 min
    Published:
    January 26, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Password, Attacks
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub