• Deutsch
  • English
Identeco
  • Products
    • Live Feed

      Instant protection against account takeover for customer accounts.

    • Credential Check

      Automated real-time verification for your customer accounts.

    • AD Protect

      Password protection for your Active Directory managing employee accounts.

    • Leak Monitoring

      Instant threat status report for your employee accounts.

  • Solutions
    • E-Commerce

      Identeco as a reliable protective shield for e-commerce

    • Cloud-based CRM and ERP providers

      Identeco as a reliable protective shield for cloud-based CRM, ERP and tender portals

    • Healthcare

      Identeco as a partner in the protection of patient data for secure medical interaction.

    • More Solutions
      • Fintech companies
      • Job portals and career services
      • Law firms and legal portals
      • Social Media
      • Insurances
      • Utility companies
      • Gaming & Gambling
      All solutions
  • Blog
  • About us
    • Our Team

      Our employees ensure more account security on the Internet.

    • Press & Media

      Current press releases, events and publications.

    • Contact

      Talk to an expert or write us a message.

    • Social Media
      • LinkedIn
      • XING
      • YouTube
      • GitHub
    Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Risks to Users and Operators of Online Platforms from Credential-Stuffing Attacks

    Credential stuffing attacks threaten the security of users and platform operators. This article explains the causes and risks for users and platform operators.

    Reading time:
    4 min
    Published:
    January 26, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Password, Attacks
  1. Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential Stuffing: A Threat to Online Platforms and Their Users

    Credential stuffing with leaked login data threatens web portals. Service providers offer secure solutions through regular checks for leaked credentials.

    Reading time:
    2 min
    Published:
    January 24, 2023
    :
    Rene Neff
    Tags:
    Credential Stuffing, Attacks, Account Takeover
  2. A screenshot of the command `git log`. One can see three commit messages: '💚 Adopt hadolint suggestions', '🚀 Pull base images on build', '⬆️  Upgrade dependencies'

    Fast and User Friendly: Our Alternative to Gitmoji

    Our Gitmoji alternative makes it easier to document changes and supports semantic versioning. More efficient work for developers.

    Reading time:
    3 min
    Published:
    January 17, 2023
    :
    Pascua Theus
    Tags:
    Tool, DevOps, How to
  3. Dark Web vs. Deep Web - What can you find there?

    Dark Web vs. Deep Web - What can you find there?

    Ordinary users rarely encounter the deep or dark web, but dangers lurk in the depths of the internet. How do these areas differ from the regular web?

    Reading time:
    4 min
    Published:
    January 16, 2023
    :
    Aura Pop & Rene Neff
    Tags:
    Deep Web, Dark Web, How to
  4. How often should you change your passwords?

    How often should you change your passwords?

    After choosing the right password, the question arises if and how often you should change your passwords.

    Reading time:
    4 min
    Published:
    December 07, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Password, Account Takeover, How to
  5. Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing Attacks

    Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing Attacks

    In this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.

    Reading time:
    4 min
    Published:
    December 01, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  6. Phishing #1: Email Phishing, Baiting and Search Engine Phishing

    Phishing #1: Email Phishing, Baiting and Search Engine Phishing

    As the start of a series, this first article introduces email phishing, baiting, and search engine phishing, showing how users are deceived.

    Reading time:
    3 min
    Published:
    November 11, 2022
    :
    Aura Pop & Rene Neff
    Tags:
    Phishing, Attacks, Account Takeover
  7. Ransomware Secure Backup Strategy

    Ransomware Secure Backup Strategy

    Ransomware is a serious threat with a high likelihood of occurrence. An important protective measure is a secure backup strategy.

    Reading time:
    5 min
    Published:
    October 04, 2022
    :
    Leo Schmidt
    Tags:
    Ransomware, Backup, Tool, DevOps
  8. Speed up Rust CI pipelines that use Tarpaulin

    Speed up Rust CI pipelines that use Tarpaulin

    In this article, we'll go over some specific tips to minimize agonizingly slow recompilations while using the code coverage tool Cargo Tarpaulin.

    Reading time:
    6 min
    Published:
    September 15, 2022
    :
    Fabian Odenthal
    Tags:
    DevOps, Rust, Tool
  9. We're starting the Identeco Blog

    We're starting the Identeco Blog

    At Identeco, we learn things every day. If you want to join this process, this blog will keep you telling new stories.

    Reading time:
    1 min
    Published:
    September 14, 2022
    :
    Pascua Theus
    Tags:
    Blog,
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
Identeco
Identeco GmbH & Co. KG
Joachimstraße 8
53113 Bonn
Telephone
+49 (0) 228 286 285 81
E-mail
contact@identeco.de
Web
www.identeco.de
VAT Reg. No.
DE336214375
Register Court
Amtsgericht Bonn
Register Number
HRA 9513
Choose your language:
  • Deutsch
  • English
  • Home
  • Products
  • About Us
  • Blog
  • Press
  • Contact
  • Privacy Policy
  • Imprint
  • LinkedIn
  • XING
  • YouTube
  • GitHub