Security

What is IT Forensics?

What is IT Forensics

IT forensics is a subfield of forensics and deals with the methodical analysis of incidents on IT systems and the securing of evidence that can be used in court. The goal is to determine exactly what actions have taken place on an IT system and who caused or is responsible for them. What is IT …

What is IT Forensics? Read More »

How to Hack an ATM

How to Hack an ATM

ATMs, also known as Automated Teller Machines or ATMs, have always been a popular target for attacks. This is a history of attacks on ATMs that starts with just blowing them open and extends to current malware attacks. ATMs have a grueling history. ATMs were first introduced in Ohio in the United States in 1959. …

How to Hack an ATM Read More »

Resetting Passwords: So that The Password Reset Does Not Become a Backdoor Into the Network

Resetting Passwords So that The Password Reset Does Not Become a Backdoor Into the Network

When users forget one of their passwords, they report to IT administration, or they can reset it themselves. But if the password reset procedure is not implemented properly, it opens up opportunities for attack by cybercriminals. Privacy regulators offer tips on what to look for. Password problems, especially in the home office Who doesn’t know …

Resetting Passwords: So that The Password Reset Does Not Become a Backdoor Into the Network Read More »

What Is a Side Channel Attack?

What Is a Side Channel Attack

A side-channel attack does not directly attack algorithms or data. The attack method uses physical or logical side effects and tries to extract protected information or algorithms by observation and analysis. Electromagnetic emissions, energy consumption, the time required for certain functions, memory usage, and others are used. Side-channel attacks are costly and difficult to prevent. …

What Is a Side Channel Attack? Read More »

What Are the Benefits of Personal Security Certifications?

What Are the Benefits of Personal Security Certifications?

CISSP, CSP, CEH: Security certifications for individuals. Some security practitioners smile at them, some job offers explicitly demand them. In any case, it’s not easy for anyone who wants to be certified as a security expert, because there are a large number of different certification bodies, training providers, and certifications. What are the benefits of …

What Are the Benefits of Personal Security Certifications? Read More »

What is an APT (Advanced Persistent Threat)?

What is an APT (Advanced Persistent Threat)?

Advanced Persistent Threat is the term for a sophisticated persistent cyber threat. Attackers have the deep technical expertise and employ elaborate methods or tools. They are organized or state-driven. Targets of an APT are typically large enterprises, government agencies, or critical infrastructure operators. The focus of the attack is to obtain sensitive, valuable or secret …

What is an APT (Advanced Persistent Threat)? Read More »

Vulnerability Scan Checklist

Vulnerability Scan Checklist

Vulnerability scans are particularly useful when they are an integral part of systematic vulnerability management. To ensure that ongoing IT operations do not suffer, administrators should approach the issue with caution. Vulnerability Scan Checklist Vulnerability scan checklists are an effective means of identifying critical gaps within the IT infrastructure. Most administrators make an effort to …

Vulnerability Scan Checklist Read More »

What is Video Surveillance as a Service (VSaaS)?

What is VSaaS Video Surveillance as a Service

Video Surveillance as a Service is a cloud-based service. The software functions and services required for video surveillance, such as storage space for video recordings, computing power for video analysis, remote viewing applications, and management and security functions, are provided by a provider via the Internet. Locally, only video surveillance cameras are required. What is …

What is Video Surveillance as a Service (VSaaS)? Read More »

What is Spoofing?

what is spoofing in computer

The term spoofing covers various methods and technical procedures to disguise one’s own identity or to feign a false identity. Several types of spoofing exist, such as IP, e-mail, DNS, ARP, URL, or caller ID spoofing. Cybercriminals use spoofing to gain unauthorized access to sensitive data, perform unauthorized transactions, introduce malware, or cause other damage. …

What is Spoofing? Read More »

What is KRITIS (Critical Infrastructures)?

What is KRITIS Critical Infrastructures

KRITIS is the abbreviation for critical infrastructure. This classification of infrastructures includes facilities or organizations that are of high importance to the community and whose failure would have serious consequences for society and the state order. KRITIS operators must meet minimum IT security requirements, which are regulated in the IT Security Act, among other things. …

What is KRITIS (Critical Infrastructures)? Read More »

Network Security Basics

Network Security Basics

Securing corporate networks requires administrators to make many decisions, plan actions and perform even more configuration steps. These include configuring the firewall, securing mail and web traffic, and selecting the right antivirus solution. This article shows which factors need to be considered and which approaches make sense. Network Security Basics Over the next few months, …

Network Security Basics Read More »

Basics of Secure Web Gateways (SWG)? What is Secure Web Gateways?

What is SWG Secure Web Gateways

Secure Web Gateways are an essential part of the security infrastructure of modern enterprise networks. They use technologies such as malware protection, advanced threat defense, and URL filtering to protect users from Internet threats and enforce corporate Internet policies. What is SWG (Secure Web Gateways)? In the past, Secure Web Gateways (SWGs) worked primarily as …

Basics of Secure Web Gateways (SWG)? What is Secure Web Gateways? Read More »

What is Cyberwar?

What is Cyberwar

Cyberwar is a warlike confrontation between states in virtual space, which is conducted by means of information technology. The aim of cyberwar is to damage countries, institutions, or society electronically and to disrupt important infrastructures. What is Cyberwar? The term cyberwar, there is no clear definition. Even in the sense of international law, it is …

What is Cyberwar? Read More »

Keeping Windows Firewall Under Control with Freeware

Keeping Windows Firewall Under Control with Freeware

With freeware tools such as GlassWire, Windows 10 Firewall Control, and Firewall App Blocker, users and administrators can additionally secure computers with Windows 10/11 better than is possible with the onboard means. In this article, we will show tools that are also interesting for professionals. Keeping Windows firewall under control with freeware Tools like GlassWire, …

Keeping Windows Firewall Under Control with Freeware Read More »

What is TEE(Trusted Execution Environment)?

What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment creates an isolated environment, sealed off from other applications and data, for the protected execution of applications or the storage of data that requires protection. The environment can be implemented on the main processor, a dedicated processor, or a special chip. Common application areas are smartphones. For example, in some devices, …

What is TEE(Trusted Execution Environment)? Read More »

What Is Biometrics?

What Is Biometrics

Biometrics refers to the science of measuring and analyzing biological characteristics. Today, biometric procedures are used to identify or verify persons. Biometric procedures are, for example, fingerprint or face recognition. What is biometrics? Biometrics goes back to the ancient Greek terms “bios” and “metron” and can be roughly translated as “measurement of human characteristics”. It …

What Is Biometrics? Read More »

Positive Trends but No Universal ICS Security

Positive Trends but No Universal ICS Security

Because basic documentation and structuring elements such as network plans are still missing, many companies are unable to properly assess the impact of identified vulnerabilities. As a result, contingency plans are not put in place, so comprehensive ICS security remains elusive despite many positive developments. Positive trends but no universal ICS security A study conducted …

Positive Trends but No Universal ICS Security Read More »