API
API This is the abbreviation for Application Programming Interface, which literally translates as ‘interface for programming applications’. In German, the term ‘Programmschnittstelle’ is generally used. Such an interface enables two programmes to communicate with one another. What exactly does API stand for? Information is exchanged via an API, an interface. This can include data or […]
Compromised web applications
Compromised web applications Web applications are all programmes and sub-programmes that are accessed and used via the internet. These include, amongst other things, websites, contact forms, advertisements displayed on websites, moving images, and so on. Like all programmes, web applications also have vulnerabilities that can be exploited – or compromised – by cybercriminals for their […]
CISA identifies critical vulnerabilities for Spring, Apple and D-Link routers
26.04.2022 Critical vulnerability in Microsoft Exchange Server The American Cybersecurity and Infrastructure Security Agency (CISA) maintains a helpful overview of known vulnerabilities that attackers exploit. On April 5, the agency added four new security vulnerabilities to this overview. Here you can find out what it is, what the risks are and how you can protect […]
Anonymiser
Anonymiser Anonymisers are programmes that conceal your identity when you use the internet. What exactly does ‘Anonymiser’ mean? Put simply, every action on the internet is based on the exchange of data. When you visit a webpage, you request data. If you see the page, that data has been sent to you. For this to […]
Attack vector
Attack vector An attack vector refers to the path or method used to launch a cyber attack on a system or company. It is the gateway that attackers use to gain unauthorized access to data, networks or systems. What does that mean in detail? Attack vectors can affect both technical vulnerabilities and human behavior. Typical […]
Alliance for cyber security
Alliance for cyber security The Alliance for Cyber Security is an initiative founded in 2012 by the German Federal Office for Information Security (BSI ). Its aim is to strengthen Germany’s resilience to cyber attacks – by helping every company to better protect itself against cyber attacks. Any company based in Germany can become a […]
Adware
Adware Adware is often installed together with free software (e.g. as a “bonus” with freeware). It then displays advertising banners, pop-ups or redirects to certain websites – either in the browser or directly in the operating system. Some adware also collects information about surfing behavior in order to display targeted advertising. Adware is not necessarily […]
Agile software development
Agile software development Agile software development refers to a particularly flexible type of software development. The process is referred to as agile because it is small-step and involves a lot of coordination. This allows us to react quickly to changing requirements, technologies, customer wishes, problems and recognized misunderstandings. What does agile software development mean in […]
Advanced Persistent Threat
Advanced Persistent Threat This term translates as ‘advanced persistent threat’ and refers to particularly sophisticated cyberattacks. Advanced persistent threats are usually targeted and can cause significant damage. On the one hand, through the destruction of data (sabotage). On the other hand, through the theft of particularly valuable data, such as state secrets or product innovations […]
Administrator
Administrator Administrator means “administrator”. In IT, the administrator manages computers, servers and networks. Among other things, they set them up, maintain and update them, and detect and rectify system errors. To this end, an administrator has unlimited access rights to all systems on a computer or network. In the wrong hands, these extensive access rights […]