Security

TOTP

Time-based one-time password: TOTP explained

Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?

What is a one-time password (OTP)?

One-time password (OTP) – more security online

Whenever you go online, you constantly have to use passwords, whether for online banking, online shopping, or logging into a company network. Unfortunately, these passwords aren’t always as secure as they should be. Using a one-time password (OTP) is one way to better protect yourself. In this article, you’ll find out what a one-time password is and why you might want to use one.

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...

IP Spoofing: Fundamentals and counter-measures

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things...

Smishing

Smishing: the best tips to fight against SMS phishing

Most Internet users likely will have heard of phishing, but what is smishing? The new threat works via mobile phone. We explain how the SMS scamming method works and what content cyber criminals frequently utilise for SMS phishing. Learn what to watch out for in order to distinguish an authentic SMS from a phishing SMS.

Social engineering – the security gap at ‘layer 8’

Social engineering: human vulnerability exploited

The most effective system break-ins often happen without a scene. Instead of disrupting central network devices with DDoS attacks or sneaking through onto operating systems with Trojan horse techniques, hackers increasingly try to exploit the human security gap. There are various such methods that fall within the broader category of social engineering: a technique that sees hackers gather publicly...

SCP Secure Copy

SCP (Secure Copy Protocol): What is SCP?

If you are looking to perform an especially secure file transfer between two computers (e.g. uploading data to a web server), there are several options available. One of these options is the Secure Copy Protocol (SCP) which provides authentication and encryption via SSH. In this article, you will learn what this protocol is and how the SCP transfer works.

SFTP (SSH File Transfer Protocol)

SFTP: The secure way to transfer data

Using SSH File Transfer Protocol (SFTP), you can transfer data bidirectionally within an authorised group of people in a particularly secure way. The transfer between the client and server takes place via an encrypted IP-based data tunnel. The basic File Transfer Protocol (FTP) has major security vulnerabilities, which were eliminated in the refined SSH File Transfer Protocol.

DNS over TLS

DNS over TLS: an improved security concept

The Domain Name System has a big security flaw: requests and responses are traditionally sent unencrypted. This provides Internet criminals with an ideal point of attack. Again and again, users are being directed to websites that they actually have no desire to visit. DNS over TLS acts as a deterrent. How does the security concept work?


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year