Security

Tips for better website security

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions can you be sure that your data stays out of the hands of criminals. [...]  

Social engineering – the security gap at ‘layer 8’

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly available information. They then use it to attempt to trick company employees by exploiting their normal human traits, such as helpfulness or fear in order to obtain privileged information and passwords. Find out how social engineering works, and what you can do to prevent it. [...]  

What is cybersecurity? The current dangers

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the US? We provide you with an overview of this.  [...]  

How do I convert my site to SSL and HTTPS?

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting from HTTP to HTTPS or SSL is an important step in securing your website and gaining your customers’ trust. [...]  

How HTTP/2 optimizes the World Wide Web

HTTP/2 has been released and is the official successor of the internet protocol HTTP/1.1. It is already compatible with many current web browsers and servers. Up to this point, many of the bigger website operators have switched to using the new transfer protocol. But what lies behind the Hyper Transfer Protocol and what are the advantages of the new version? [...]  

Finding a website host: how to search successfully

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays? [...]  

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to e-mail accounts, and what you can do to regain control of your account if the worst does happen. [...]  

Has my e-mail been hacked? These tools reveal the truth

Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce three tools to help you check whether your e-mail has been hacked. [...]  

Scamming: How to protect yourself against online fraud

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money transfers. How does the scam work, and how can you protect yourself? [...]  

Comparison of the best antivirus programs

Antivirus programs have become essential for the security of our computers. Viruses, worms, trojans, and many other types of malware threaten to infect the system and cause considerable damage. Losing personal data and the consequences resulting from this can be extremely irritating. Software manufacturers are trying to combat malicious malware attacks with the help of intelligent antivirus programs. In our overview, we introduce the well-known antivirus products and provide detailed information about what to consider when choosing antivirus software. [...]