Security

Personal data
Everything you need to know about personal data
  • Digital law

What do your e-mail address, eye color, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected...

Everything you need to know about personal data
SMTP-Auth
What is SMTP authentication? Secure e-mail against spam
  • Technical matters

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP...

What is SMTP authentication? Secure e-mail against spam
Linking restrictions due to ECJ judgement
Linking restrictions due to ECJ judgement
  • Digital law

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

Linking restrictions due to ECJ judgement
Referral spam: causes and countermeasures
Referral spam: attack patterns and countermeasures
  • Web analytics

Do you find that lots of the traffic that arrives on your site comes from suspicious sources? There’s no need to worry since website operators encounter inconsistencies in reports from analysis tools (such as Google Analytics, Piwik, or etracker). The reason: referral spam falsifies visitor statistics. Learn how hackers can manipulate referrer information and traffic data, as well as which...

Referral spam: attack patterns and countermeasures
Penetration testing – the complete network check
Penetration test: how to find weak points in your network
  • Know-how

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This...

Penetration test: how to find weak points in your network
Port scanning: introduction and basics
How port scanning contributes to your system’s security
  • Know-how

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools check the activities of various applications or computers and can close existing security gaps. Using port scanners is one...

How port scanning contributes to your system’s security
Protection against ransomware, spyware, and scareware
Ransomware, adware, etc. – how can you protect yourself?
  • Security

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Ransomware, adware, etc. – how can you protect yourself?
Honeypots: IT security through decoy programs
What is a honeypot?
  • Security

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

What is a honeypot?
Click fraud: how to out fraudulent clicks
How to protect yourself from click fraud
  • Online sales

Every year, click fraud costs the advertising industry billions. An increasing amount of advertising operators have to deal with the fact that their ads often don’t reach their intended targets due to artificially generated clicks through the likes of link farms or bot nets that seek to deplete advertising budgets. We take a closer look at the topic of click fraud and show you some counter...

How to protect yourself from click fraud
Hardware firewall: the more stable firewall solution
Hardware firewall – the external security system
  • Security

Most computer users are at least aware of the term firewall. When activated, they help protect computers. But announcements about blocked applications can become a source of irritation for many users, especially when the background information for such messages is unknown. But how do firewalls work? And what role do hardware firewalls play in protecting your computer?

Hardware firewall – the external security system