Security

Linking restrictions due to ECJ judgment

'Playboy' judgement restricts the freedom to link

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

Personal data

Everything you need to know about personal data

What do your e-mail address, eye colour, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected...

Brute force attack: definition and protective measures

Brute force attacks: when passwords are served on a silver platter

Being constantly faced with headlines about stolen passwords, it’s understandable that many users are concerned. Your best bet is to make your passwords as complicated as possible and have them consist of many different types of characters. But even this won’t help if it’s the actual log-in area that isn’t secure enough. Even today, attackers are still successful with the notorious and simple...

Server Name Indication

Server Name Indication (SNI): What’s behind the standard?

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...

Browser fingerprints: tracking without cookies

Browser fingerprints: the basics and protection options

In recent years, so-called browser fingerprinting has established itself as a tracking method that doesn’t rely on the use of cookies. Web servers capture different characteristics from visitors’ browsers and determine their digital fingerprint based on them. They enable visitors to be recognised at a later date. While some information is automatically transmitted, it is mainly active elements...

Click fraud: how to out fraudulent clicks

How to protect yourself from click fraud

Every year, click fraud costs the advertising industry billions. An increasing amount of advertising operators have to deal with the fact that their ads often don’t reach their intended targets due to artificially generated clicks through the likes of link farms or bot nets that seek to deplete advertising budgets. We take a closer look at the topic of click fraud and show you some counter...

Online identity theft protection

Online identity theft protection

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just merely screenwriters’ fantasies; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of the...

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...

Referral spam: causes and countermeasures

Referral spam: attack patterns and countermeasures

Do you find that lots of the traffic that arrives on your site comes from suspicious sources? There’s no need to worry since website operators encounter inconsistencies in reports from analysis tools (such as Google Analytics, Piwik, or etracker). The reason: referral spam falsifies visitor statistics. Learn how hackers can manipulate referrer information and traffic data, as well as which...

Finding a website host: how to search successfully

Host: how to find out which provider is most suitable for your project

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?


We’re all in this together. At IONOS we are
#hereforyou
Coronavirus is a challenge we need to face together.
We've created special offers on key products to help
your business keep going.
3 months free
Online Shop
Be where your customers are with your own online store.