Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding AttacksLearn about phishing types like pharming (redirection to fake websites) and doc clouding (attackers sharing links while posing as colleagues).
Protecting Your Data from Ransomware Attacks: How to Secure Yourself and Your BusinessRansomware attacks are a growing threat. Victims are forced to pay a ransom to decrypt their data. This article outlines protective measures.
Phishing #3: Smishing, Vishing and Email Clone PhishingWe present three types of phishing attacks: smishing, vishing, and email clone phishing. The goal is to obtain information or install malware.
Phishing in 2023 - Our PredictionsPhishing attacks are a major threat in the digital world, including in 2023. Criminals are specializing and using AI for deepfakes and convincing campaigns.
Verify Login Credentials to Protect against Credential-Stuffing AttacksOnline platforms must ensure high security standards to protect users from ATO attacks. A specialized service provider offers advantages.
Risks to Users and Operators of Online Platforms from Credential-Stuffing AttacksCredential stuffing attacks threaten the security of users and platform operators. This article explains the causes and risks for users and platform operators.
Credential Stuffing: A Threat to Online Platforms and Their UsersCredential stuffing with leaked login data threatens web portals. Service providers offer secure solutions through regular checks for leaked credentials.
Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing AttacksIn this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.
Phishing #1: Email Phishing, Baiting and Search Engine PhishingAs the start of a series, this first article introduces email phishing, baiting, and search engine phishing, showing how users are deceived.