Security

Personal data
Everything you need to know about personal data
  • Digital law

What do your e-mail address, eye color, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected...

Everything you need to know about personal data
SMTP-Auth
What is SMTP authentication? Secure e-mail against spam
  • Technical matters

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP...

What is SMTP authentication? Secure e-mail against spam
Linking restrictions due to ECJ judgement
'Playboy' judgement restricts the freedom to link
  • Digital law

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

'Playboy' judgement restricts the freedom to link
Honeypots: IT security through decoy programs
What is a honeypot?
  • Security

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

What is a honeypot?
Click fraud: how to out fraudulent clicks
How to protect yourself from click fraud
  • Online sales

Every year, click fraud costs the advertising industry billions. An increasing amount of advertising operators have to deal with the fact that their ads often don’t reach their intended targets due to artificially generated clicks through the likes of link farms or bot nets that seek to deplete advertising budgets. We take a closer look at the topic of click fraud and show you some counter...

How to protect yourself from click fraud
IPsec: security architecture for IPv4 and IPv6
Secure network connections with IPsec
  • Know-how

A big problem with the previous Internet Protocol version, IPv4, was the missing guarantee of security standards of integrity, authenticity, and confidentiality. This previous protocol lacked the necessary means to identify data sources or enable secure transport. The protocol suite IPsec, developed for IPv4’s successor, IPv6, has changed the situation for Internet Protocol overnight.

Secure network connections with IPsec