Security

SYN flood
SYN flood attack
  • Security

The attack pattern of a SYN flood attack has been known since the early years of the World Wide Web. Over time, new attack variants and appropriate protective measures have arisen. DDoS attacks with massive data flows originating from botnets are currently the norm. Learn how SYN flood attacks work. We will explain the concepts of these attacks and countermeasures.

SYN flood attack
SSD life span
How long is a SSD lifespan?
  • Security

SSD life span is an important factor in data security and efficient backup strategies. Are electronic flash memories as reliable as classic hard drives with magnetic storage? When does their service life end, and are there any indications of an imminent failure? What should you do in the event of an emergency? Is data recovery possible, and is it even worth it?

How long is a SSD lifespan?
SQL injection: Fundamentals and safeguards
SQL injection
  • Security

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

SQL injection
Social engineering – the security gap at ‘layer 8’
What is Social engineering?
  • Security

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

What is Social engineering?
Shoulder surfing
What is Shoulder surfing?
  • Security

Malicious hackers gain unauthorized access to sensitive data by identifying weaknesses in security mechanisms and exploiting them. However, technical skills are not always required to be able to steal data. This is the case for shoulder surfing which exploits the greatest weakness of every computer system and security measure – the human being.

What is Shoulder surfing?
Set up Google Authenticator
How to set up Google Authenticator
  • Security

Whether emails or online banking, two-factor authentication has become a security standard when accessing user accounts online. Entering a password alone is no longer sufficient to log in. To secure your Google account, the Internet giant provides its own Google Authenticator app, which generates a unique code every time you log in. Read on to find out how to set it up.

How to set up Google Authenticator
Scareware
What is scareware?
  • Security

Scammers use scareware to trick users out of their money or to get them to install more malware. Fortunately, there are effective ways to protect yourself against scareware, as well as signs that can help you identify threats before you fall victim. Our article has everything you need to know about scareware so let’s get started.

What is scareware?
Scamming: How to protect yourself against online fraud
How Scamming works and how to protect against it
  • Security

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...

How Scamming works and how to protect against it
SAML
What is SAML?
  • Security

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion markup language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

What is SAML?
Rainbow tables
What are rainbow tables?
  • Security

Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.

What are rainbow tables?