TAN procedures

iTAN, mTAN, chipTAN? An overview of all TAN procedures

Security in online banking has always been a cornerstone of the industry – TAN procedures like chipTAN are what make it possible. However, there are also many other variants of this two-factor authentication system that can be used to protect your banking transactions. As they say, a chain is only as strong as its weakest link – and in this case, it’s the user. Find out which TAN procedures are...

Password managers: an overview of today’s best tools

Password manager – a glance at the best tools

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

How to Protect Access to your Cloud

Using cloud services securely

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

HPKP: The security feature for SSL/TLS certification

HPKP: What is behind the public-key pinning extension for HTTP

SSL/TLS certificates play an increasingly important role in the transmission of sensitive data. They guarantee that data packets reach the desired addressee without any detours. Problems only arise when internet users are deliberately redirected by invalid certificates from dubious certification bodies – a scenario that can be prevented using so-called HTTP public key pinning (HPKP).

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterized not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Honeypots: IT security through decoy programs

What is a honeypot?

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year