IT-Security Blog

Read over 500 free articles about hacking, malware and scams on the Internet.

Fake-Accounts auf LinkedIn

Fake accounts on LinkedIn – A problem?

Social networks determine our everyday life, for companies LinkedIn is often an important network for maintaining contacts. But due to fake accounts on LinkedIn, major hacks and security problems rise. Why LinkedIn? Fake accounts on Instagram or Facebook are common. For attackers, however, LinkedIn is a valuable platform because it … continue reading

Call ID Spoofing

Call ID spoofing becomes more difficult

Call ID spoofing, the concealment of telephone numbers, will be made more difficult in Germany as of 1.12.22 by an amendment to the Telecommunications Act (TKG). But how exactly is this implemented? How does Call ID Spoofing work? We’ve dealt with Call ID spoofing on the blog before. To summarize … continue reading

Pentest as a service - aware7

What is Pentest as a Service?

Pentest as a Service can be relevant for anyone who is continuously striving to have their infrastructure and applications examined for IT security. Progressive digitization brings with it many advantages. Companies can work faster and more flexibly, as well as react more flexibly to changes. But digital networking and the … continue reading

Caffeine – A new phishing toolkit keeps us awake

Caffeine is a phishing-as-a-service (Phaas) toolkit. Just recently, we presented EvilProxy, a phishing toolkit. Unlike EvilProxy, Caffeine has a special feature: the registration process is significantly simplified and is accessible from the normal Internet. Anyone who knows the address of the site can register. The purpose of Caffeine As a … continue reading

Was ist eine Phishing Simulation

What is a phishing simulation?

Running a phishing simulation is a topic that is often underestimated. At first listen, it sounds like a video game for anglers, but it protects companies from compromise. Since we offer a phishing simulation as a service and have customers who ask about this again and again, we would like … continue reading