Security

Twitter account hacked
Twitter account hacked - what to do?
  • Social media

In recent years, reports of compromised Twitter accounts have been piling up. If your Twitter account has been hacked, recovering the account is often not that difficult to do. In our article, we explain how you can tell whether your account has been hacked and what the next steps should be if this is unfortunately the case.

Twitter account hacked - what to do?
Facebook account hacked
Facebook account hacked: How to get your account back
  • Social media

Increasing cybercrime is making itself felt on social networks. Social media sites such as Facebook are integrated into everyday private and professional life and offer an ideal target for attack due to the large amount of personal data. Here’s what to do if your Facebook account has been hacked and your password was changed.

Facebook account hacked: How to get your account back
Instagram account hacked
Instagram account hacked - what to do?
  • Social media

As the popularity of a social network increases, so does the likelihood that users could become victims of hack attacks. Because of the many private photographs, Instagram accounts are often hacked, for the simple purpose of blackmailing the account’s owner. In this article we will show you how to recover your hacked Instagram account.

Instagram account hacked - what to do?
Cyberattacks
Cyberattacks: the dangers lurking online
  • Security

Cyberattacks threaten individuals, companies, and public authorities alike. Criminals are always coming up with new techniques to cause as much damage as possible. The motives behind their actions vary from greed to political goals. So how can you protect yourself against cyberattacks? Our article tells you everything you need to know.

Cyberattacks: the dangers lurking online
The best PayPal alternative
The best alternatives to PayPal at a glance
  • Online sales

Americans love shopping online because it’s so convenient. Until recently, online payment systems were heavily dominated by one industry heavyweight: PayPal. But not everyone is enthused by this payment method, having been criticized for both security as well as data protection issues. Fortunately, there are plenty of PayPal alternatives out there. We’ll introduce a few here.

The best alternatives to PayPal at a glance
Manage passwords in Chrome
Manage passwords in Google Chrome – here’s how
  • Security

A forgotten password quickly becomes a problem if it is not written down anywhere. Google does offer ways to recover forgotten passwords. However, it is better not to let it happen in the first place. The solution: Use the integrated password manager to manage passwords in Chrome or use an alternative password manager app.

Manage passwords in Google Chrome – here’s how
RSA cryptosystems
How do RSA cryptosystems work?
  • Security

RSA encryptions are asymmetric encryptions and are put to use in many areas of digital data transfers because they can be easily used but not easily decrypted with an algorithm. Here, we explore how RSA keys work, what they are used for, and in which fields RSA cryptosystems can also be useful. Read on to find out more.

How do RSA cryptosystems work?
Gain users’ confidence with a privacy policy
Getting a privacy policy for your website
  • Digital law

An important part of a website that many operators underestimate is the privacy policy. This notifies site visitors of the information they are disclosing about themselves and what their data will be used for. But what kind of information should this declaration contain, what has changed since the EU General Data Protection Regulation law, and how does this affect companies in the US?

Getting a privacy policy for your website
ISO 27001
ISO 27001: Standardizing Information Security in Companies
  • Security

By complying with the ISO 27001 standard, companies can prove they carefully handle information and plan for exceptional circumstances. Public certificates and standards according to the ISO certification create trust among consumers and attest to the company’s secure and tested treatment of data. The certification is performed by an independent institute.

ISO 27001: Standardizing Information Security in Companies
VPN Windows 10
VPN in Windows 10: how to set up VPN
  • Security

Want to use a secure, encrypted connection or access your company or home network while on the road? A VPN connection on Windows 10 is the solution. VPN connections route your encrypted data through a secure tunnel and provide improved data security. Learn all you need to know for setting up a VPN in Windows 10.

VPN in Windows 10: how to set up VPN