Security

Sign e-mails with a digital signature

Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own reputations, businesses operating online should be fully aware of the importance of electronic signatures. Find out more about how they function here. [...]  

Tips for better website security

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions can you be sure that your data stays out of the hands of criminals. [...]  

Browser fingerprints: tracking without cookies

In recent years, so-called browser fingerprinting has established itself as a tracking method that doesn’t rely on the use of cookies. Web servers capture different characteristics from visitors’ browsers and determine their digital fingerprint based on them. They enable visitors to be recognized at a later date. While some information is automatically transmitted, it is mainly active elements such as Flash animations or JavaScript applications that provide crucial information. [...]  

Securing a server: correctly configuring Linux, etc.

If you operate or rent your own server, it is your responsibility to protect it against failures and external access. You can immediately begin to set the foundation for this when configuring the server, if you have the necessary administrative rights. The correct settings can work wonders, especially with encrypted remote connections via SSH protocol, and greatly increase security. [...]  

Social engineering – the security gap at ‘layer 8’

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly available information. They then use it to attempt to trick company employees by exploiting their normal human traits, such as helpfulness or fear in order to obtain privileged information and passwords. Find out how social engineering works, and what you can do to prevent it. [...]  

What is cybersecurity? The current dangers

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the US? We provide you with an overview of this.  [...]  

SSL stripping – how to protect your web project

Data transmission via SSL/TLS is one of the most effective means to give a web project more security. Even before packets are sent, powerful algorithms ensure the encryption of the information. If third parties capture the data on the transmission path, the true content remains hidden from them. However, it becomes problematic if attackers are active with their tools, even before the encryption process has begun. This is the case with so called SSL stripping. [...]  

How do I convert my site to SSL and HTTPS?

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust. [...]  

Malvertising: what’s behind the cruel scam

Malvertising is a growing problem for webmasters, online marketers and, last but not least, the millions of people who are affected every year. Behind this term is a sneaky method in which advertising banners are used to spread malicious software. No website is safe from this deceit – even well-known websites with millions of visitors have been compromised by these viruses. There are, however, countermeasures that you can take. Our article explains everything you need to know about how malvertising works and how to protect your website against it. [...]  

Two factor authentication: Protection for your accounts

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two factor authentication works, and which methods exist for securing your accounts. [...]