Data theft

Firefox Monitor – new Mozilla service informs about data theft!

The Firefox Monitor informs you about current data thefts and can tell you whether your own data occurs in stolen data records. A practical service that many more people in Germany should know.

continue reading

10KBLAZE – Great Danger for SAP-Systems

The Exploit 10KBLAZE construction kit was opened and represents a major danger for the majority of all SAP systems. The Office for Cyber Security and Digital Infrastructure (CISA) from the USA announced a public warning message for the SAP systems on May 2, 2019.

continue reading

Git repository deleted – developers blackmailed!

The blackmail business has been flourishing on the Internet for quite some time – a new scam is now hitting developers who are deleting the public git repository. All that remains is a note with the wallet, to which approx. 0.1 bit coins are to be transferred in order to get back to the data.

The developers are not completely innocent. Since most developers have a local repository, the damage is limited. Interesting and critical to the same is the attack anyway.

continue reading

World Password Day – The last of its kind?

The correct handling of passwords is very important, as attacks such as phishing or identity theft are increasingly successful. On the 1st Thursday in May, World Password Day, we will show you what you need to consider when dealing with passwords and why the password could soon be abolished!

continue reading

One cracked, one hacked forever. Password stolen – and now?

Was my password stolen? Do you use easy-to-remember passwords? Do you use the same password for different portals? Answers to these questions are essential for the security of your digital identity. We therefore recommend that you regularly check whether your data has been stolen and act accordingly. Password stolen, individualized … continue reading

LinkedIn and information retrieval!

LinkedIn, for some a torture, for others an important tool for networking and exchanging information. Ask any online marketing specialist and they’ll probably say things like “LinkedIn is the most underrated, fastest growing network, just post some ads”. In the information age, data is gold and attackers find it particularly … continue reading

Recognizing fake news and fake profiles could become more difficult in the future!

In the future, A.I. systems that learn could be increasingly used to create and distribute deceptively real images for fake profiles, ransomware campaigns and fake news. The quality of the results is continuously increasing and people are facing new challenges to recognize them. Decloaking fake profiles with the reverse image … continue reading

Politician Hack: This is how large parts of the data were collected!

The whole of Germany is puzzling about the politician Hack, the origin of the stolen data, its purpose and above all about the perpetrators. One thing is already certain: the perpetrator or perpetrators have gone to a lot of trouble. They have collected data, categorized, sorted and marked victims according … continue reading

The IT-Security Trends 2019 – that comes to us!

What are the IT Security Trends 2019? Numerous companies, bloggers and other IT security-savvy people are currently asking themselves this question and the corresponding answers.

Is everything true? Not at all important – but it does show an assessment of where we stand today and what the writers believe is possible. We want to join this – these are our trends!

continue reading

This football club is most often used as a password!

Football clubs are often used as passwords. How often exactly? We took a closer look at this! You can register quickly on platforms, websites or in apps – if it weren’t for the annoying password. But how do you remember all the passwords? Obviously, many people use their football clubs … continue reading