Computer

Mobile Device Management With Microsoft 365

Mobile Device Management With Microsoft 365

Companies that rely on Microsoft 365 also receive basic mobile device management functions. These can be used for Android devices and also for iOS/iPadOS. In many cases, however, companies here rely on Microsoft Endpoint Manager/Intune features. Basic Mobility and Security enables the basic management of smartphones and tablets as part of the connection to Microsoft …

Mobile Device Management With Microsoft 365 Read More »

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

The steep rise in phishing attacks in recent months was reason enough for Sophos to take a closer look at this form of cybercrime. The result: Sophisticated tactics combined with penetrating behavior make up the new quality of phishing emails. Attackers have discovered the benefits of malware-as-a-service (MaaS) – a cousin of ransomware-as-a-service (RaaS), both …

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life Read More »

Effective Safeguards Against Account Takeover

The use of digital online services shapes our everyday lives. The spectrum ranges from e-mail, social networks, and online stores to utilities, insurers, health insurance companies, and professional services. Access data is correspondingly attractive to criminal attackers, who use it to take over existing user accounts (account takeover). Attackers are constantly developing new ideas for …

Effective Safeguards Against Account Takeover Read More »

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

What Is Home Office?

What Is Home Office?

Homeoffice is a form of telework that can be performed as telecommuting or alternating telecommuting. The work is performed completely or partially from private premises. Contact with the company, colleagues, or customers takes place via telephone, e-mail, and other Internet services. The IT and communications equipment required is a telephone, PC or laptop, and an …

What Is Home Office? Read More »

Keeping Windows Firewall Under Control with Freeware

Keeping Windows Firewall Under Control with Freeware

With freeware tools such as GlassWire, Windows 10 Firewall Control, and Firewall App Blocker, users and administrators can additionally secure computers with Windows 10/11 better than is possible with the onboard means. In this article, we will show tools that are also interesting for professionals. Keeping Windows firewall under control with freeware Tools like GlassWire, …

Keeping Windows Firewall Under Control with Freeware Read More »

What Are Authorizations?

What Are Authorizations

With the help of permissions of an operating system, users can access the various resources of a computer. These resources are, for example, files, applications, peripherals, interfaces or computing power, and other objects. What are authorizations? In modern multi-user operating systems, rights management for the various users is integrated, which can be used to grant …

What Are Authorizations? Read More »

Virus Scan with Microsoft Process Explorer

Virus Scan with Microsoft Process Explorer

Process Explorer from Microsoft Sysinternals can also be used to scan Windows servers and workstations for viruses. In addition to system utilization, attackers can also be detected and combated. Virus scan with Microsoft Process Explorer The free Sysinternals Process Explorer can display the running processes on Windows computers and helps with analysis. This also makes …

Virus Scan with Microsoft Process Explorer Read More »

New Trend: Phishing via SMS

Phishing via SMS

The smartphone has become the constant companion of our modern society. That’s why it’s important not only to beware of fraud and hacking on the computer but also to include mobile devices such as cell phones. Unfortunately, smishing – phishing via SMS – is a growing trend. New trend: phishing via SMS Patrycja Tulinska, Managing …

New Trend: Phishing via SMS Read More »

What Is a Password Manager?

What Is a Password Manager

No user can remember complex passwords, but password management systems can easily accommodate many combinations of any letters, numbers, and special characters. Password managers for managing access data and passwords are therefore an important security measure in the online world. What is a password manager? No one should have to remember complex passwords anymore. Password …

What Is a Password Manager? Read More »

What is WireGuard?

What is WireGuard

WireGuard is a still very young technology to realize secure and powerful virtual private networks (VPNs) with little effort. It is an open-source protocol and software that is intended to provide an alternative to established VPN solutions such as OpenVPN or IPsec. WireGuard was developed with the goal of making VPNs easier and providing an …

What is WireGuard? Read More »

What is Mimikatz?

What is Mimikatz?

Mimikatz is a tool that can be used to display cached credentials of a computer running the Microsoft Windows operating system by exploiting vulnerabilities. The software is freely available and can be downloaded from GitHub in a 32-bit or 64-bit version. What is Mimikatz? Mimikatz is a tool that developer Benjamin Delpy originally intended to …

What is Mimikatz? Read More »

What Is a Keylogger?

What Is a Keylogger

A keylogger is a software or hardware that is capable of logging a user’s keystrokes on a computer. With such a logger, it is possible to obtain confidential data or spy out passwords. What is a keylogger? Keylogger is sometimes also called as a keystroke logger. Such a logger can be implemented either in the …

What Is a Keylogger? Read More »