What is Malware and how to prevent it

What is Malware and how to prevent it

  • Security

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

What is Malware and how to prevent it
Ransomware, adware, etc. – how can you protect yourself?

Ransomware, adware, etc. – how can you protect yourself?

  • Security

The internet is a playground for cybercriminals and fraudsters – for many, this is an annoying and frightening reality. The threats from unwanted software range from harmless advertising to trojans, which can paralyze complete computer networks. The forms of malicious software or malware are diverse, the countermeasures often very simple. In our article, you can read about how ransomware, spyware,…

Ransomware, adware, etc. – how can you protect yourself?
What is the hacker collective Anonymous?

What is the hacker collective Anonymous?

  • Security

Supposedly fun mass attacks on people who were easy targets used to be organized on image boards like 4chan. These are the beginnings of Anonymous, but they don’t have much in common with the collective’s actions today. Political commitment is the group’s main aim nowadays. Anonymous are known for wearing the Guy Fawkes mask. But beware, it’s not always Anonymous behind every mass attack.

What is the hacker collective Anonymous?
How to use cloud services securely

How to use cloud services securely

  • Security

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will…

How to use cloud services securely
What is phishing? Get a rundown on the methods here

What is phishing? Get a rundown on the methods here

  • Security

Phishing is one of the oldest scams, existing since the dawn of cybercrime. It’s even more deceitful than trying to smuggle malware onto computers. Instead, you’ll receive emails from people you know or from banks or payment services trying to persuade you to give out personal payment or login data. Find out what is the meaning of phishing and what modern phishing methods are currently used from…

What is phishing? Get a rundown on the methods here
What is a Zero-day exploit?

What is a Zero-day exploit?

  • Security

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a Zero-day exploit?
How to wipe a hard drive (HDD or SSD) securely

How to wipe a hard drive (HDD or SSD) securely

  • Security

Even formatting a hard drive under Windows or Mac does not completely wipe all data. Although wiping it is not impossible, it requires additional tools to be able to wipe a Mac hard drive or Windows hard drive with the utmost thoroughness. These can be used to safely wipe and overwrite data on both an HDD and an SSD. You can find out how this works here.

How to wipe a hard drive (HDD or SSD) securely
What is spoofing?

What is spoofing?

  • Security

Spoofing attacks encompass a wide range of potential attack scenarios. Besides conventional approaches like IP spoofing and DNS spoofing, they also include particularly dangerous phishing attacks. Read this article to find out how spoofing attacks work and what measures you can take to protect yourself effectively.

What is spoofing?
What is SIEM (Security Information and Event Management)?

What is SIEM (Security Information and Event Management)?

  • Security

Security gaps in IT infrastructure can risk a company’s reputation or even threaten its survival. Where criminals manage to shut down company networks or gain access to sensitive data, financial and image-related damage becomes a certainty. SIEM (Security Information and Event Management) allows businesses to detect danger in real-time, allowing for appropriate and timely reactions.

What is SIEM (Security Information and Event Management)?
What is RBAC? (Role Based Access Control)

What is RBAC? (Role Based Access Control)

  • Security

Organizations restrict access permissions in systems to protect sensitive data from unauthorized access and modification. However, assigning access permissions to users individually is a high-maintenance and error-prone process. In the case of role-based access control (RBAC), permissions are assigned based on previously assigned roles. Here, we explain how role-based access control works.

What is RBAC? (Role Based Access Control)
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.