Security

Protection against ransomware, spyware, and scareware

Ransomware, adware, etc. – how can you protect yourself?

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,...

Keylogger

Keyloggers: how do they work and how do you protect yourself from them?

Keyloggers are programs or devices that get access to your credentials by recording your keystrokes. Keyloggers hide in operating system software and leak data. Some keylogger hardware is even more sophisticated, since it can document your keyboard behavior or tap directly into the data stream. Learn how keyloggers work and which variants are available in our guide. We also give you tips on how to...

DoS and DDoS: attack patterns at a glance

DoS: attack patterns and countermeasures

It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes. But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

Linking restrictions due to ECJ judgement

Linking restrictions due to ECJ judgement

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

Personal data

Everything you need to know about personal data

What do your e-mail address, eye color, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected...

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Server Name Indication

Server Name Indication (SNI): What’s behind the standard?

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Browser fingerprints: tracking without cookies

Browser fingerprints: the basics and protection options

In recent years, so-called browser fingerprinting has established itself as a tracking method that doesn’t rely on the use of cookies. Web servers capture different characteristics from visitors’ browsers and determine their digital fingerprint based on them. They enable visitors to be recognized at a later date. While some information is automatically transmitted, it is mainly active elements...

Click fraud: how to out fraudulent clicks

How to protect yourself from click fraud

Every year, click fraud costs the advertising industry billions. An increasing amount of advertising operators have to deal with the fact that their ads often don’t reach their intended targets due to artificially generated clicks through the likes of link farms or bot nets that seek to deplete advertising budgets. We take a closer look at the topic of click fraud and show you some counter...


Wait! We’ve got something for you!
Have a look at our great prices for different domain extensions.


Enter the web address of your choice in the search bar to check its availability.
.club
$1/1st year
then $15/year
.com
$1/1st year
then $15/year
.info
$1/1st year
then $20/year
.me
$1/1st year
then $20/year