Hackers
Hackers In the field of information technology, a “hacker” is someone who penetrates computer systems without authorization. Criminal hackers are predominantly present in the public consciousness, using their skills to their advantage and to the detriment of others. However, there are also “ethical hackers” who uncover gaps in systems and networks so that they can […]
Firewall
Firewall A firewall, similar to how a firewall protects a building from fire, protects your network from unwanted access by having a program monitor traffic according to predefined rules and only forwarding data that complies with the rules. This program can be installed directly on your computer or – as an external firewall – on […]
Fake antivirus
Fake antivirus Fake antivirus translates (and completed): fake antivirus software. Refers to useless or even malicious software that supposedly detects and eliminates viruses and other malware. It is mostly spread on the Internet via fake virus alerts. Fake antivirus programs are scams. This is because cybercriminals demand money for the removal of non-existent viruses. Therefore, […]
Exploit
Exploit The term translates as “exploit, exploit” and refers to IT programs that detect security gaps. Cybercriminals usually use exploit programs that exploit the vulnerabilities they find. Therefore, exploits are considered malware programs. What does the term exploit mean in detail? Exploit programs are also used by programmers to discover security vulnerabilities and then fix […]
EU General Data Protection Regulation (GDPR)
EU General Data Protection Regulation (GDPR) The European General Data Protection Regulation has been in force in Germany since 25 May 2018. This is associated with stricter data protection requirements in companies and significantly increased fines (up to 20 million euros or up to 4% of annual turnover) in the event that the rules are […]
Endpoint Detection and Response (EDR)
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR) is a security concept for cyber incident protection that combines software and human response. Software is installed on an end device (endpoint), such as a computer, smartphone or tablet, which detects malware and anomalies (detection). Malware detected by the software is finally isolated and prevented […]
Drive-by Malware
Drive-by Malware Drive-by malware refers to malware that installs itself on a user’s computer “in passing”, so to speak. “Drive by” literally means “in passing” and corresponds to the German idiom “in passing”. Just visiting a compromised website is enough to infect a computer with drive-by malware. No further action by the user is necessary, […]
Doxing
Doxing The term doxing is derived from the English word “documents” (short “docs”) for documents. Doxing (also doxxing) is the targeted collection of information about people with the help of the Internet. In this case, personal, often confidential data is researched with the aim of publishing it and thus exposing the person or harming him […]
Double Extortion Ransomware
Double Extortion Ransomware Double extortion translates to “double extortion”. This does not necessarily involve multiple blackmail, but the cybercriminals use several means of pressure for their blackmail. With the ransomware that has been common up to now, there is usually a means of exerting pressure: the data of a computer, network or system is encrypted. […]
DOS and DDOS attack
DOS and DDOS attack DOS stands for Denial of Service. This literally translates to “denial of service.” More appropriate would be “unavailability of the service”. This is because a DOS attack aims to deliberately overload a system so much that it can no longer perform its tasks – the service it offers is no longer […]