Security

1Password Alternatives

1Password alternatives: the best password managers

Password managers are extremely practical tools to help remember the passwords for the many online accounts you may have. They usually work via browser extensions or desktop apps, and are available across most operating systems. Among the many password managers, 1Password has established itself as a solid tool for many users. However, 1Password is relatively expensive and there are doubts about...

Single sign-on

Single sign-on (SSO)

Online activity could be so simple – just enter your access data once and automatically be logged in for all accounts and services on the web, instead of having to remember dozens of passwords. This is, in fact, a reality for many websites, and the process is called SSO – single sign-on – and is becoming ever more popular among private and professional users. But what are the benefits of SSO, and...

Honeypots: IT security through decoy programs

What is a honeypot?

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

How to Protect Access to your Cloud

Using cloud services securely

In the digital age, we are increasingly resorting to cloud services: At work, people collaborate on projects together in the cloud, and in their free time, they share photos from their last vacation. At the same time, cloud storage is by no means free from security risks. The multi-cloud environments of larger companies, in particular, are becoming a challenge for cloud security. Here, we will...

Man-in-the-middle attack: an overview of attack patterns

Man-in-the-middle attack: attack patterns and countermeasures

A man-in-the-middle attack is a deceitful espionage attack which aims to listen, record, or manipulate sensitive data being sent between unsuspecting internet users. To do this, hackers rely on methods that enable them to position themselves, unnoticed, between two or more computers communicating with one another. We introduce you to some well-known attack patterns and countermeasures that can be...

QUIC – the Internet Transport Protocol based on UDP

QUIC: What is behind the experimental Google Protocol?

Quick UDP Internet Connections (QUIC for short), is an experimental network protocol from Google. Further development of the protocol is being driven by IETF, which has set up a dedicated group working towards it. The QUIC protocol is intended to offer a speed-optimized alternative to the current transport standard TCP and builds on the connectionless protocol UDP to achieve this.

The best online backup services

Comparing the best online backup services

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a system crash or criminal activitiy. What is the best option? Here is a comparison of online backup service providers.

Chrome Updates

What is Chrome 68?

Early next month, Chrome 68 will be launched and the new browser will distrust all webpages that do not have HTTPS encryption as “not secure”. This is a big step in the recent trend towards emphasising user safety on the internet, a not entirely selfless strategy from Google. In this guide, we will explain what changes will be made, why they are happening, and how you can prepare your website...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

HSTS: Reliably secure your HTTPS connections

HSTS: How the HTTPS expansion works

HTTPS, the network protocol for TLS-encrypted data transfer online can be circumvented in some cases. The danger is that encrypted websites can be accessed via unencrypted HTTP. But the HTTPS extension HSTS (HTTP Strict Transport Security) forces website access via TLS encryption, closing the security gaps that hackers like to use to intercept the HTTPS connection during transport using...