Security

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

WLAN security: the best protection for your network

WLAN security: how to make your wireless network into a fortress

When you’re traveling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make...

Scamming: How to protect yourself against online fraud

Scamming: What is behind the fraud?

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...

Has my e-mail been hacked? These tools reveal the truth

Has my e-mail been hacked? How to find out!

Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce four tools to help you check whether your e-mail has been hacked.

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

S/MIME: the standard method for e-mail encryption

S/MIME: how to encrypt and sign your e-mails

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

Sign e-mails with a digital signature

More security online: sign e-mails with a digital signature

Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own...

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Regardless if it’s your own holiday photos, or important documents for work - storing files with online storage providers takes the load off your hard drive, and also ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences...

The best PayPal alternative

The 7 best alternatives to PayPal at a glance

Americans love shopping online because it’s so convenient. Fast, easy, and secure payment methods have contributed to the rise of this sector. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty...

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: new laws since the spring of 2018

Since May 25, 2018 a new European law on data protection has been in place. However, many companies and website operators are still unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for...


Get your own .US domain now, the first year is free!



Limited time offer*





Enter the web address of your choice in the search bar to check its availability.
* Offer valid for customers with a bona fide US presence. Promotion ends on August 31, 2019.