Account takeover and concert ticketsWhat do the world's most famous pop star and account takeovers and data leaks have in common? What does this have to do with platform protection? Find out here!
Phishing #7: Social EngineeringIn this special edition of our phishing series, we explore social engineering. We show how it works in real life and how it can impact the digital world.
Phishing #6: Spearphishing, Watering-Hole Attack and Whaling AttacksDiscover the dangers of spearphishing, watering hole, and whaling. Learn how these phishing methods work and how to spot them.
ProSBAcT Unites Identeco and StartUp Secure in Battle Against Account TakeoversStarting in June 2023, the project ProSBAcT begins with StartUp Secure of the FMER. We share goals, collaborations, and how ProSBAcT enriches our work.
Phishing #5: Malvertising, Https-Phishing und Evil TwinOur blog series on phishing continues. Learn about malvertising, HTTPS phishing, and Evil Twin, as well as how to protect yourself from these attacks.
Phishing #4: Pharming Attack, Browser in browser Attacks and Doc Clouding AttacksLearn about phishing types like pharming (redirection to fake websites) and doc clouding (attackers sharing links while posing as colleagues).
Phishing #3: Smishing, Vishing and Email Clone PhishingWe present three types of phishing attacks: smishing, vishing, and email clone phishing. The goal is to obtain information or install malware.
Phishing in 2023 - Our PredictionsPhishing attacks are a major threat in the digital world, including in 2023. Criminals are specializing and using AI for deepfakes and convincing campaigns.
Phishing #2: CEO Fraud, Corporate Phishing and Angler Phishing AttacksIn this second part of our series on Phishing CEO Fraud, Corporate Phishing and Angler are introduced.
Phishing #1: Email Phishing, Baiting and Search Engine PhishingAs the start of a series, this first article introduces email phishing, baiting, and search engine phishing, showing how users are deceived.