• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential Stuffing Attacks with leaked login data put web portals at risk. Protective measures include regular checks for leaked logins. Service providers offer a fast, user-friendly and secure solution.

    Reading time:
    2 min
    Published:
    January 24, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Attacks, Account Takeover
  1. A screenshot of the command `git log`. One can see three commit messages: '💚 Adopt hadolint suggestions', '🚀 Pull base images on build', '⬆️  Upgrade dependencies'

    Fast and User Friendly: Our Alternative to Gitmoji

    Our Gitmoji alternative makes it easier to document changes and supports semantic versioning. More efficient work for developers.

    Reading time:
    3 min
    Published:
    January 17, 2023
    :
    Pascua Theus
    Tags:
    Tool, DevOps, How to
  2. Dark Web vs. Deep Web - What can you find there?

    Dark Web vs. Deep Web - What can you find there?

    Normal users rarely if ever come into contact with the Deep Web or Dark Web, but potential danger lurks in the 'depths' of the Internet. How do these two areas differ from the regular Internet and how can you protect yourself from danger?

    Reading time:
    4 min
    Published:
    January 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Deep Web, Dark Web, How to
  3. How often should you change your passwords?

    How often should you change your passwords?

    After choosing the right password, the question arises if and how often you should change your passwords.

    Reading time:
    4 min
    Published:
    December 07, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Password, Account Takeover, How to
  4. Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing Attacks

    Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing Attacks

    In this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.

    Reading time:
    4 min
    Published:
    December 01, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  5. Phishing #1: Email Phishing, Baiting and Search Engine Phishing

    Phishing #1: Email Phishing, Baiting and Search Engine Phishing

    Email phishing, baiting and search engine phishing - what is it? In this multi-part article, we give a brief introduction to the different variants that are used to deceive users.

    Reading time:
    3 min
    Published:
    November 11, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  6. Ransomware Secure Backup Strategy

    Ransomware Secure Backup Strategy

    Ransomware is currently a real and serious threat.The probability of being hit by it is currently high and realistic. An important protective measure against it is a ransomware-proof backup strategy.

    Reading time:
    5 min
    Published:
    October 04, 2022
    :
    Leo Schmidt
    Tags:
    Ransomware, Backup, Tool, DevOps
  7. Speed up Rust CI pipelines that use Tarpaulin

    Speed up Rust CI pipelines that use Tarpaulin

    In this article, we'll go over some specific tips to minimize agonizingly slow recompilations while using the code coverage tool Cargo Tarpaulin.

    Reading time:
    6 min
    Published:
    September 15, 2022
    :
    Fabian Odenthal
    Tags:
    DevOps, Rust, Tool
  8. We're starting the Identeco Blog

    We're starting the Identeco Blog

    At Identeco, we learn things every day. If you want to join this process, this blog will keep you telling new stories.

    Reading time:
    1 min
    Published:
    September 14, 2022
    :
    Pascua Theus
    Tags:
    Blog,
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub