B.Sc. Tobias Neugebauer

Phishing Tool

The 12 best tools for phishing simulations

Phishing simulations are an essential part of any IT security strategy. This is simply because phishing is still a major and serious problem that can compromise companies relatively easily and quickly. The phishing simulation provides you with security and sensitizes your own employees to this extremely important topic, because in … continue reading

Y2K38

Y2K38 – The new millennium bug?

At the turn of the year 1999/2000, there were dystopian predictions, from the failure of computer systems to the false starts of nuclear weapons systems. The reason for this was the bug known as the Millennium Bug or Y2K Bug – And in 2038, a related problem awaits us in … continue reading

dmarc

DMARC – Purpose & Functionality Explained!

Email itself is quite old, and so are the protocols standardized for it. Between all these old protocols, DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is practically still an infant. We explain the purpose behind this protocol and how it works in this article. The history of DMARC … continue reading

dkim

What is DKIM?

If you are looking for protection mechanisms for email on the Internet, you will quickly come across DKIM. This identification protocol is designed to counteract unwanted emails such as spam or phishing. But what is this protocol all about? How does it work and how can I use it myself … continue reading

digitale signatur

How do digital signatures work?

If you want to sign something in the analog world, you can simply take a pen and put your signature under the corresponding document. In the digital space, digital signatures exist for this purpose, but they can do much more than merely exist and be recognized as a legally valid … continue reading

Call ID Spoofing

Call ID spoofing becomes more difficult

Call ID spoofing, the concealment of telephone numbers, will be made more difficult in Germany as of 1.12.22 by an amendment to the Telecommunications Act (TKG). But how exactly is this implemented? How does Call ID Spoofing work? We’ve dealt with Call ID spoofing on the blog before. To summarize … continue reading

Caffeine – A new phishing toolkit keeps us awake

Caffeine is a phishing-as-a-service (Phaas) toolkit. Just recently, we presented EvilProxy, a phishing toolkit. Unlike EvilProxy, Caffeine has a special feature: the registration process is significantly simplified and is accessible from the normal Internet. Anyone who knows the address of the site can register. The purpose of Caffeine As a … continue reading

Quishing Betrugsmasche mit QR-Codes

Quishing – The dangerous QR codes of the scammers

The corona pandemic is a veritable goldmine for scammers and phishers, with testing centers emailing test results and registration requests, vaccination appointments being confirmed online, and follow-ups being filled out online. A new scam has developed here – Quishing, phishing via QR codes. Why did this method emerge and how … continue reading