Computer

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

What Is Home Office?

What Is Home Office?

Homeoffice is a form of telework that can be performed as telecommuting or alternating telecommuting. The work is performed completely or partially from private premises. Contact with the company, colleagues, or customers takes place via telephone, e-mail, and other Internet services. The IT and communications equipment required is a telephone, PC or laptop, and an …

What Is Home Office? Read More »

Keeping Windows Firewall Under Control with Freeware

Keeping Windows Firewall Under Control with Freeware

With freeware tools such as GlassWire, Windows 10 Firewall Control, and Firewall App Blocker, users and administrators can additionally secure computers with Windows 10/11 better than is possible with the onboard means. In this article, we will show tools that are also interesting for professionals. Keeping Windows firewall under control with freeware Tools like GlassWire, …

Keeping Windows Firewall Under Control with Freeware Read More »

What Are Authorizations?

What Are Authorizations

With the help of permissions of an operating system, users can access the various resources of a computer. These resources are, for example, files, applications, peripherals, interfaces or computing power, and other objects. What are authorizations? In modern multi-user operating systems, rights management for the various users is integrated, which can be used to grant …

What Are Authorizations? Read More »

Virus Scan with Microsoft Process Explorer

Virus Scan with Microsoft Process Explorer

Process Explorer from Microsoft Sysinternals can also be used to scan Windows servers and workstations for viruses. In addition to system utilization, attackers can also be detected and combated. Virus scan with Microsoft Process Explorer The free Sysinternals Process Explorer can display the running processes on Windows computers and helps with analysis. This also makes …

Virus Scan with Microsoft Process Explorer Read More »

New Trend: Phishing via SMS

Phishing via SMS

The smartphone has become the constant companion of our modern society. That’s why it’s important not only to beware of fraud and hacking on the computer but also to include mobile devices such as cell phones. Unfortunately, smishing – phishing via SMS – is a growing trend. New trend: phishing via SMS Patrycja Tulinska, Managing …

New Trend: Phishing via SMS Read More »

What Is a Password Manager?

What Is a Password Manager

No user can remember complex passwords, but password management systems can easily accommodate many combinations of any letters, numbers, and special characters. Password managers for managing access data and passwords are therefore an important security measure in the online world. What is a password manager? No one should have to remember complex passwords anymore. Password …

What Is a Password Manager? Read More »

What is WireGuard?

What is WireGuard

WireGuard is a still very young technology to realize secure and powerful virtual private networks (VPNs) with little effort. It is an open-source protocol and software that is intended to provide an alternative to established VPN solutions such as OpenVPN or IPsec. WireGuard was developed with the goal of making VPNs easier and providing an …

What is WireGuard? Read More »

What is Mimikatz?

What is Mimikatz?

Mimikatz is a tool that can be used to display cached credentials of a computer running the Microsoft Windows operating system by exploiting vulnerabilities. The software is freely available and can be downloaded from GitHub in a 32-bit or 64-bit version. What is Mimikatz? Mimikatz is a tool that developer Benjamin Delpy originally intended to …

What is Mimikatz? Read More »

What Is a Keylogger?

What Is a Keylogger

A keylogger is a software or hardware that is capable of logging a user’s keystrokes on a computer. With such a logger, it is possible to obtain confidential data or spy out passwords. What is a keylogger? Keylogger is sometimes also called as a keystroke logger. Such a logger can be implemented either in the …

What Is a Keylogger? Read More »

What Is Computer Fraud?

What Is Computer Fraud

Computer fraud is a criminal offense under cybercriminal law. Computer fraud occurs, for example, when a perpetrator interferes with the function of computer programs without permission, modifies them, or operates them with false deeds, and a financial loss is incurred by a third party. Attempts are also punishable. The penalties range from fines to imprisonment …

What Is Computer Fraud? Read More »

Using Windows Defender Credential Guard and HVCI Correctly

Using Windows Defender Credential Guard and HVCI Correctly

Windows Defender Credential Guard helps secure credentials on networks. Hypervisor-Protected Code Integrity (HVCI), in turn, uses virtualization technologies to protect computer memory. Using Windows Defender Credential Guard and HVCI correctly Windows Defender Credential Guard is an internal network protection system usable on Windows 10 and Windows Server 2016/2019. If attackers have infiltrated the network, there …

Using Windows Defender Credential Guard and HVCI Correctly Read More »