Security

Windows 7: End of Life

Windows 7 end of support: What you need to do?

Even years after it was first released, Windows 7 continues to be one of the favourite operating systems worldwide. But with Microsoft announcing the end of its support for Windows 7, many PC users will need to upgrade or look for an alternative. But just because Windows 7 has reached the end of its life, doesn’t mean the software is no longer working. Windows 7 EOL means that Microsoft will no...

Comparison of the best antivirus programmes

Antivirus software: Which software is best?

Antivirus software has sadly become indispensable as new types of threats against your system emerge regularly. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats, software makers try to fight off malware attacks with intelligent antivirus programs. Find out which rank top in our antivirus...

SQL injection: Fundamentals and safeguards

SQL Injection: Protect your database system

There are daily reports on how security gaps in applications are exploited – because hardly a day goes by without a new gap being discovered or a known gap being closed. One attack method, which has always been based on exploiting such weak points, is called SQL injection. But what is actually hidden behind the malicious database exploitation and how can you protect your database system from it?

Client to Authenticator Protocol (CTAP)

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

Zero-day exploit

Zero-day exploit: Explanation and protection measures

The risk for businesses to fall victim to a zero-day exploit has increased in recent years. More and more often, cybercriminals can take advantage of as-yet undiscovered weak points in business software in order to steal or manipulate data. It is difficult to protect against these attacks, but businesses can take some measures to improve their security.

What is a reverse proxy?

Reverse proxy server – core components in security architecture

Cyber criminality is a big issue for most companies’ IT departments. Online attacks threaten the security of private networks and cause millions of dollars of damage per year. Popular targets are servers that provide online services and therefore require a permanent internet connection. An extra layer of security can be applied by using an upstream network component – the reverse proxy. This...

Cloud Act

CLOUD Act vs. Data Privacy and Control

In its fight against terrorism and crime, the USA continues to add measures of protection, including the Patriot Act, Safe Harbor, Privacy Shield; and for over 16 months the US CLOUD Act. All these measures keep the debate on data protection and digital sovereignty alive, particularly for trade nations such as the UK.

Best cloud storage providers

The best cloud storage providers – an overview of the best online storage

Storing files online on a cloud platform has become part of everyday life for many people. Regardless if it’s your own holiday photos, or important documents for work - storing files with online storage providers takes the load off your hard drive, and also ensures that they are available anytime and from anywhere. But what are the best cloud storage providers on the market? And what differences...

What is a rootkit?

What you need to know about rootkits

If you ask the IT community which malware is the most harmful, the answer is typically not viruses, worms or Trojan horses. Experts unanimously agree that rootkits pose much greater problems even to experienced users. The rootkit’s special ability is to conceal other malware and thereby enable cybercriminals to misuse others’ computers for their own criminal activities undetected – such as for bot...

How do I convert my site to SSL and HTTPS?

Internet security: secure websites with SSL and HTTPS

The topic of data security is becoming increasingly important for both private users as well as in the business world. As a website owner, you should take all the necessary precautions to ensure that a visit to your site is as secure as possible. Converting your site from HTTP to HTTPS or SSL is an important first step to securing your website and gaining your customers’ trust.


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.