Security

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: new laws since the spring of 2018

Since May 25, 2018 a new European law on data protection has been in place. However, many companies and website operators are still unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

QUIC – the Internet Transport Protocol based on UDP

QUIC: What is behind the experimental Google Protocol?

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

The best online backup services

Comparing the best online backup services

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a system crash or criminal activitiy. What is the best option? Here is a comparison of online backup service providers.

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasizing user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilized functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

HSTS: Reliably secure your HTTPS connections

HSTS: How the HTTPS expansion works

HTTPS, the network protocol for TLS-encrypted data transfer online can be circumvented in some cases. The danger is that encrypted websites can be accessed via unencrypted HTTP. But the HTTPS extension HSTS (HTTP Strict Transport Security) forces website access via TLS encryption, closing the security gaps that hackers like to use to intercept the HTTPS connection during transport using...

Server failure – what to do?

Server failure: risks, consequences, countermeasures

Server failures can be devastating for businesses, especially if central business areas are controlled by IT systems since the longer the server is down, the costlier is it for the company. This can result in loss of sales and in the worst case, the loss of business or customer data. Here we demonstrate the internal and external sources of danger that can lead to server failure, explain the...

How do I convert my site to SSL and HTTPS?

Internet security: secure websites with SSL and HTTPS

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust.

Gain users’ confidence with a privacy policy

Getting a privacy policy for your website

An important part of a website that many operators underestimate is the privacy policy. This notifies site visitors which information they are disclosing about themselves and what this data will be used for. But what kind of information should this declaration contain, what has changed since the new EU General Data Protection Regulation law, and how does this affect companies in the US?

1