What is Malware and how to prevent it

What is Malware and how to prevent it

  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Ransomware, adware, etc. – how can you protect yourself?

Ransomware, adware, etc. – how can you protect yourself?

  • Security

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,…

Ransomware, adware, etc. – how can you protect yourself?
What is the hacker collective Anonymous?

What is the hacker collective Anonymous?

  • Security

Supposedly fun mass attacks on people who were easy targets used to be organized on image boards like 4chan. These are the beginnings of Anonymous, but they don’t have much in common with the collective’s actions today. Political commitment is the group’s main aim nowadays. Anonymous are known for wearing the Guy Fawkes mask. But beware, it’s not always Anonymous behind every mass attack.

What is the hacker collective Anonymous?
How to use cloud services securely

How to use cloud services securely

  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will…

How to use cloud services securely
What is phishing? Get a rundown on the methods here

What is phishing? Get a rundown on the methods here

  • Security

Phishing is one of the oldest scams, existing since the dawn of cybercrime. It’s even more deceitful than trying to smuggle malware onto computers. Instead, you’ll receive emails from people you know or from banks or payment services trying to persuade you to give out personal payment or login data. Find out what is the meaning of phishing and what modern phishing methods are currently used from…

What is phishing? Get a rundown on the methods here
What is FIDO2?

What is FIDO2?

  • Security

Passwords are not an ideal way to surf the World Wide Web safely. They are either so complex that they are hard to remember, or so simple that they can be guessed in next to no time. FIDO2 takes a different approach and relies on modern technology. The open standard has the potential to make surfing the net safer and more convenient at the same time.

What is FIDO2?
What is a firewall?

What is a firewall?

  • Security

A firewall provides effective protection against viruses and other malware that attempts to infect your computer. However, it needs to be properly configured to do so. In the following article, you will learn how to do this, how a firewall works, and what its limitations are.

What is a firewall?
What is a DMZ (Demilitarized zone) in Network Security?

What is a DMZ (Demilitarized zone) in Network Security?

  • Security

Companies hosting their own websites, an online shop, or e-mail inboxes should make sure to separate the corresponding server of these from the local network. This makes it possible to protect devices within the company network from hacker attacks that take place on public networks. Solid protection comes in the form of a demilitarized zone, which separates endangered systems from sensitive…

What is a DMZ (Demilitarized zone) in Network Security?
What is TLS (Transport Layer Security)?

What is TLS (Transport Layer Security)?

  • Security

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorized third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this integral element of the modern Internet.

What is TLS (Transport Layer Security)?
What is Social engineering?

What is Social engineering?

  • Security

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly…

What is Social engineering?
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.