How often should you change your passwords?After choosing the right password, the question arises if and how often you should change your passwords.
Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing AttacksIn this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.
Phishing #1: Email Phishing, Baiting and Search Engine PhishingEmail phishing, baiting and search engine phishing - what is it? In this multi-part article, we give a brief introduction to the different variants that are used to deceive users.
Ransomware Secure Backup StrategyRansomware is currently a real and serious threat.The probability of being hit by it is currently high and realistic. An important protective measure against it is a ransomware-proof backup strategy.
Speed up Rust CI pipelines that use TarpaulinIn this article, we'll go over some specific tips to minimize agonizingly slow recompilations while using the code coverage tool Cargo Tarpaulin.
We're starting the Identeco BlogAt Identeco, we learn things every day. If you want to join this process, this blog will keep you telling new stories.