The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.
If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...
Criminals are constantly trying to exploit Internet vulnerabilities and harm users. One common type of cyberattack is a cross-site request forgery attack, or CSRF. Hackers use these attacks to make purchases and transfer money on a user’s behalf without the victim noticing. How can these attacks be prevented?
Technically, the Domain Name System (DNS) is a good thing because it allows you to access a website using its URL rather than its IP address. The domain address is then automatically interpreted as an IP address – thanks to the DNS. But despite these performance benefits, the system carries a significant risk: DNS Hijacking. The practice is simple: a hacker accesses a user’s device configuration...
The ZIP format enables you to combine multiple files or entire directory trees in a compressed container file. This not only saves hard drive space when archiving; ZIP files can also be password protected, if required, to safeguard archived content from third-party access. We show you how to do this.
Rainbow tables: they may sound innocent, but they’re actually a strong attack method for cybercriminals. Using rainbow tables, you can find out specific passwords in just a few seconds. To protect yourself and your users from such attacks, you should understand how the tables function. We explain rainbow tables using an example.
The “pathway to hell” – this is how Eran Hammer-Lahav once called the security protocol OAuth 2.0, on which he himself had worked for years. Others, however, use the service without issue. It enables users to use data and functions across multiple platforms in multiple services – for example, with the convenient single sign-on – using secure API authorisation. But how exactly does OAuth2 work and...
Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?
There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?