2022

dmarc

DMARC – Purpose & Functionality Explained!

Email itself is quite old, and so are the protocols standardized for it. Between all these old protocols, DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is practically still an infant. We explain the purpose behind this protocol and how it works in this article. The history of DMARC … continue reading

dkim

What is DKIM?

If you are looking for protection mechanisms for email on the Internet, you will quickly come across DKIM. This identification protocol is designed to counteract unwanted emails such as spam or phishing. But what is this protocol all about? How does it work and how can I use it myself … continue reading

digitale signatur

How do digital signatures work?

If you want to sign something in the analog world, you can simply take a pen and put your signature under the corresponding document. In the digital space, digital signatures exist for this purpose, but they can do much more than merely exist and be recognized as a legally valid … continue reading

Crypto Mining

What is crypto mining and how safe is it?

It all started with Bitcoin, or rather its whitepaper, which first revealed the idea of a digital currency. A currency that would not be controlled by states or governments and would be decentralized, so that any outside intervention seemed almost impossible. This is Satoshi Nakamoto’s Bitcoin, which is now known … continue reading

Fake-Accounts auf LinkedIn

Fake accounts on LinkedIn – A problem?

Social networks determine our everyday life, for companies LinkedIn is often an important network for maintaining contacts. But due to fake accounts on LinkedIn, major hacks and security problems rise. Why LinkedIn? Fake accounts on Instagram or Facebook are common. For attackers, however, LinkedIn is a valuable platform because it … continue reading

Call ID Spoofing

Call ID spoofing becomes more difficult

Call ID spoofing, the concealment of telephone numbers, will be made more difficult in Germany as of 1.12.22 by an amendment to the Telecommunications Act (TKG). But how exactly is this implemented? How does Call ID Spoofing work? We’ve dealt with Call ID spoofing on the blog before. To summarize … continue reading