Malware

What Is Spear Phishing?

What is spear phishing?

Spear phishing is a personalized form of the classic phishing attack. A targeted attack on specific individuals or organizations is intended to steal data or install malware on systems. Spear phishing is usually carried out with the help of e-mails or messages on social networks. Attackers have obtained information in advance to ensure that the …

What Is Spear Phishing? Read More »

What Is a Backdoor Attack?

What Is a Backdoor Attack?

A backdoor is alternative access to a software or hardware system that bypasses normal access protection. A backdoor can be used to bypass the security mechanisms of hardware and software. The access may be intentionally implemented or secretly installed. What Is a Backdoor Attack? In the IT environment, a backdoor is an alternative access method …

What Is a Backdoor Attack? Read More »

What is Spyware?

What is Spyware

Spyware is software that spies on and records activities on the computer or on the Internet without the user’s knowledge. This information can be passed on to third parties and misused for purposes such as advertising. What is Spyware? Spyware in German means spying or snooping software and refers to a program that spies on …

What is Spyware? Read More »

What is Malware?

What is malware

Malware, also known as malicious software, is one of the biggest risks for IT systems and data. When detecting and defending against malware, the specifics of the different types of malware must be taken into account. What is malware? Malware refers to malicious, harmful software. Unlike software that unintentionally causes damage because it is faulty, …

What is Malware? Read More »

What is A Computer Worm?

What is a computer worm?

A computer worm is a malware that copies itself and spreads autonomously without needing a host file. Typical propagation paths of the worm are networks or removable media. The malicious functions of the computer worm can be very diverse. What is a computer worm? Like the computer virus or the Trojan, the computer worm belongs …

What is A Computer Worm? Read More »

What is BSI Standard 200-3?

What is BSI Standard 200-3

BSI Standard 200-3 is an elementary component of the BSI’s IT-Grundschutz methodology, along with Standards 200-1 and 200-2. The standard contains procedures for performing risk analyses to ensure basic IT protection. The standard bundles all risk-related work steps for implementing IT-Grundschutz. In 2017, standard 200-3 replaced the previous standard 100-3. What is BSI Standard 200-3? …

What is BSI Standard 200-3? Read More »

What is A Hacker?

What is a hacker?

Hackers are technically skilled people in the hardware and software environment. They find vulnerabilities of systems to draw attention to them or to use them for specific purposes such as unauthorized intrusion or to change functions. What is a hacker? Hackers in the hardware environment try to specifically change the functions of devices by modifying …

What is A Hacker? Read More »

What is A Computer Virus?

What is A Computer Virus

A computer virus is a program code that attaches itself to a host file and multiplies itself independently. It changes the functions of the infected computer. It is usually programmed as malware and executes harmful functions or manipulates the computer and its data. What is a computer virus? A computer virus is capable of replicating …

What is A Computer Virus? Read More »

Active Directory Management with the “Red Forest”

Active Directory Management with the Red Forest-

Almost all organizations rely on Active Directory as the primary authentication mechanism on their network. As a result, Active Directory is also the most popular target for attacks. Microsoft’s Active Directory Red Forest design, aka Enhanced Security Administrative Environment (ESAE), is intended to provide an additional level of security. Active Directory Management with the “Red …

Active Directory Management with the “Red Forest” Read More »

Basics of Email Security: No Chance for Phishing and Trojans!

Basics of Email Security No Chance for Phishing and Trojans

Emails are still the most important means of communication for companies, and at the same time they are the most important entry route for malware into a company network. Ransomware, phishing, virus-infected attachments and even spam are concrete threats to IT security. Administrators need to know what to do to secure the mail transmissions in …

Basics of Email Security: No Chance for Phishing and Trojans! Read More »

Is Malware A Bad Virus?

Is Malware A Bad Virus

No, a virus is one type of malware actually. Viruses are a type of malware. By their definition, malware is any type of harmful or malicious software. This includes viruses, worms, spyware, adware, and so on. When you install a virus onto your computer, it can take over your system as well as corrupt files …

Is Malware A Bad Virus? Read More »