
Greetings from Hollywood
Image Credit: Vincentas Liskauskas via Unsplash 21.09.2020 Greetings from Hollywood Cybersecurity | Cyberattacks | Protection It is a curious case. Katja L., a Berlin entrepreneur from the entertainment industry, was
Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.
Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Image Credit: Vincentas Liskauskas via Unsplash 21.09.2020 Greetings from Hollywood Cybersecurity | Cyberattacks | Protection It is a curious case. Katja L., a Berlin entrepreneur from the entertainment industry, was

Image Credit: Camilo Jimenez via Unsplash 18.09.2020 Hospitals targeted by cybercriminals Cybersecurity | Cyberattacks | Protection It happened early Thursday morning. The IT systems of the University Hospital Düsseldorf have

Image source: Youcel Moran via Unsplash 22.07.2020 #TwitterHacked – unprecedented attack by cybercriminals on the micro-blogging service Cybersecurity | Hacker | Cybercrime One name is better known than the other.

Image source: via Unsplash 28.07.2020 Attention, vishing! Cybersecurity | Hacker | Cybercrime No, we didn’t make a mistake. It is actually about the so-called “vishing”. Vishing is a special form

Image source: Cerqueira via Unsplash 23.04.2020 The friend stranded abroad Cybersecurity | Hacker | Cybercrime The “Stranded Friend Scam” is a real classic among scams. Nevertheless, many people still fall

13.03.2020 When hackers hack hackers Cybersecurity | Hacker | Cybercrime Exceptionally, cybercriminals also hack each other. But that’s not a reason to breathe a sigh of relief. The common image

Image Source: Microsoft 17.01.2020 Windows 7 and possible consequences of ending support Cybersecurity | IT Protection | Operating System It is still one of the most widely used operating systems.

Image source: Conrad.de 20.11.2019 How to deal with a data incident: Conrad Electronic Cybersecurity | IT Protection | Data protection Today it’s not about a current danger, but about the

Who doesn’t know it, the e-mail inbox is overflowing and you laboriously click through the list of unopened messages. Criminals hope for the one moment when concentration wanes and the thoughtless recipient clicks on the dubious link or infected attachment. Maybe he also discloses confidential data?

Currently, cyber fraudsters and dubious advertisers are sending out numerous Google calendar invitations. Instead of real appointments, these contain spam messages. We’ll show you how to protect yourself against it.