Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.

Medien & Inhalte

Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Schadprogramme (Malware)

Malicious programs | Malware The term is made up of “mal” for “evil, bad” and the word part “-ware” from software. It therefore refers to harmful software; terms such as

Weiterlesen »

SIM swapping

SIM swapping With SIM swapping, a criminal ensures that all of the victim’s calls and text messages are redirected to the fraudster’s SIM card. This allows them to impersonate the

Weiterlesen »

Smishing

Smishing Smishing is a type of phishing that takes the form of text messages – SMS – sent to cell phones. The messages are intended to entice potential victims to

Weiterlesen »

Spam

Spam Generally refers to unwanted, electronically transmitted information. Spam appears in various forms and is primarily known in connection with e-mails. However, it can also appear as advertising banners, pop-ups

Weiterlesen »

Spear phishing

Spear phishing Spear phishing is a particularly perfidious and targeted form of phishing. In contrast to widely distributed mass emails, this method targets individuals within a company. Attackers carry out

Weiterlesen »

Spyware

Spyware The term is made up of the English word “spy” and the word part “-ware” from software. It refers to programs that spy on user or computer data and

Weiterlesen »

Social engineering

Social engineering Social engineering refers to interpersonal manipulation used by cyber criminals to gain access to other people’s computer systems and sensitive data. The term comes from the English word

Weiterlesen »

Sniffer

Sniffer Sniffers are programs that record and often analyze the data traffic of a network. Their name is derived from the English word “sniff”. What does that mean in detail?

Weiterlesen »

Tracking

Tracking With the help of so-called cookies (small data packages that are automatically stored on the PC), it is possible to track your behavior on the Internet across several websites.

Weiterlesen »

Trojan

Trojan Also known as a “Trojan horse”, malware is malicious software that enters computers or networks with the help of a camouflage. The name is derived from the Greek myth

Weiterlesen »