Schadprogramme (Malware)
Malicious programs | Malware The term is made up of “mal” for “evil, bad” and the word part “-ware” from software. It therefore refers to harmful software; terms such as
Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.
Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.
Malicious programs | Malware The term is made up of “mal” for “evil, bad” and the word part “-ware” from software. It therefore refers to harmful software; terms such as
SIM swapping With SIM swapping, a criminal ensures that all of the victim’s calls and text messages are redirected to the fraudster’s SIM card. This allows them to impersonate the
Smishing Smishing is a type of phishing that takes the form of text messages – SMS – sent to cell phones. The messages are intended to entice potential victims to
Spam Generally refers to unwanted, electronically transmitted information. Spam appears in various forms and is primarily known in connection with e-mails. However, it can also appear as advertising banners, pop-ups
Spear phishing Spear phishing is a particularly perfidious and targeted form of phishing. In contrast to widely distributed mass emails, this method targets individuals within a company. Attackers carry out
Spyware The term is made up of the English word “spy” and the word part “-ware” from software. It refers to programs that spy on user or computer data and
Social engineering Social engineering refers to interpersonal manipulation used by cyber criminals to gain access to other people’s computer systems and sensitive data. The term comes from the English word
Sniffer Sniffers are programs that record and often analyze the data traffic of a network. Their name is derived from the English word “sniff”. What does that mean in detail?
Tracking With the help of so-called cookies (small data packages that are automatically stored on the PC), it is possible to track your behavior on the Internet across several websites.
Trojan Also known as a “Trojan horse”, malware is malicious software that enters computers or networks with the help of a camouflage. The name is derived from the Greek myth