IT-Security Blog

Read over 500 free articles about hacking, malware and scams on the Internet.

World Password Day – The last of its kind?

The correct handling of passwords is very important, as attacks such as phishing or identity theft are increasingly successful. On the 1st Thursday in May, World Password Day, we will show you what you need to consider when dealing with passwords and why the password could soon be abolished!

continue reading

Further Ransomware attacks are successful – The BSI issues a warning message!

As we already reported in March, current ransomware attacks generate considerable damage. A Swiss manufacturer of airport maintenance and street cleaning vehicles is currently affected. The number of reports continues to increase, so that the BSI has now issued a warning message. What is Ransomware? The term Ransomware is derived … continue reading

Huawei uses NSA Malwaretechnique and has Software Management Issues

The annual report 2019 of the Huawei Cyber Security Evaluation Centre Oversight Board (HCSEC) shows that Huawei has ignored basic (partly their own) rules of software development for years and uses partly unmanageable software. Microsoft also reports that Huawei software unnecessarily used techniques otherwise known from malware.

continue reading

The DDoS attack of a different kind – 65,000 e-mails overload server!

An e-mail to 65,000 recipients can put a strain on your own infrastructure – and provide a DDoS attack of a different kind. Email distribution lists can be handy: Target group-oriented approach, without much effort. However, given the size of the mailing list, you should not overdo it.

continue reading

How much does Live-Hacking cost?

Live hacking is a great way to raise employee awareness in the short term and is great for starting an enterprise-wide awareness campaign.

continue reading

Dubious craftsmen – that’s how they recognize fraudsters!

Dubious craftsmen turn an emergency into a disaster. Have you locked yourself out or is the dishwasher clogged? In such or similar problems many people turn to a professional craftsman. Like many other companies, craft companies also advertise on the Internet.

But how do I recognize a frivolous craft enterprise and what do I do if I have sat on a fraud?

continue reading

One cracked, one hacked forever. Password stolen – and now?

Was my password stolen? Do you use easy-to-remember passwords? Do you use the same password for different portals? Answers to these questions are essential for the security of your digital identity. We therefore recommend that you regularly check whether your data has been stolen and act accordingly. Password stolen, individualized … continue reading

LinkedIn and information retrieval!

LinkedIn, for some a torture, for others an important tool for networking and exchanging information. Ask any online marketing specialist and they’ll probably say things like “LinkedIn is the most underrated, fastest growing network, just post some ads”. In the information age, data is gold and attackers find it particularly … continue reading

Critical vulnerability found in medical devices!

A security gap in medical devices can have serious consequences for the people who carry them. In contrast to conventional computers, smartphones or tablets, the implanted devices can sometimes only be upgraded to the latest state of the art with considerable effort.

Concrete cases show that the threat is not small. Live demonstrations make the problem tangible and can even lead to death. There have already been enough cases in the past.

continue reading

Recent ransomware outbreak hits many businesses and government agencies!

A successful Ransomware campaign can even throw giants like Norsk Hydro off the rails. The British police and personnel in this country are currently particularly attentive when opening e-mails. All companies have one topic in common: They work with e-mails and are threatened by a current Ransomware campaign.

Already in 2016 we warned against the Golden Eye Ransomware. However, reports of successful ransomware attacks are currently increasing significantly, although the danger should be more present today than 2016.

continue reading