Keylogger

Keyloggers: how do they work and how do you protect yourself from them?

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

Rainbow tables

What are rainbow tables?

Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.

Password managers: an overview of today’s best tools

Password manager – a glance at the best tools

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

How to Protect Access to your Cloud

Using cloud services securely

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Content Security Policy: how websites are becoming safer

Content Security Policy: more security with web content

Websites can be full of security risks, especially when it comes to active content like JavaScript. Cross-site scripting enables cyber criminals to modify this content for their own purposes. This is dangerous for website operators and especially for internet users. The Content Security Policy tries to reduce this risk. Learn what’s behind the security standard and how it works.

HPKP: The security feature for SSL/TLS certification

HPKP: What is behind the public-key pinning extension for HTTP

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...


Get your own .US domain now, the first year is free!



Limited time offer*





Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence. Promotion ends on August 31, 2019.