info@increaseyourskills.com +49 341 249 116 71|    |  DE  |  EN

Blog

Keeping you informed of the latest news.

 


Our Blog

We comment on all the latests changes in the world of information security, data protection, cybersecurity as well as our own company developments.
Below you will find an overview of each blog article.

Trojan Horses: From Ancient History to Modern Threat

In January of this year, the Trojan horse (or simply trojan) known as Emotet was disrupted thanks to a coordinated international effort, which included authorities from both sides of the Atlantic. Since originating as a banking trojan in 2014, it has gone on to wreak havoc across millions of devices. It was even developed into an ‘attack for hire’ service offered to other criminal gangs...

Delusion or Reality? How Artificial Intelligences Abuse Our Trust

Do you still remember Barack Obama’s words: “President Trump is a total and complete dipshit!”? Quite provocative, one is not used to such statements from the ex-US president. But did he really say that? Of course he didn’t. This video is a so-called deepfake and was created by Jordan Peele to show how dangerous such a fake can be. But let’s delve a little deeper into the matter...

Measuring Cybersecurity Awareness Training: Methods and Motivations

I am sure we are all familiar with the scenario: You want more funding for a project, funding that will contribute to a positive outcome for the company if invested correctly, but you face stiff resistance from the powers that be. It comes down to money, pure and simple. How much do they have to put in...

Ransom Attack on Colonial Pipeline

There is an increasing trend of cybercriminals "kidnapping" data and holding it to ransom. This is achieved by encrypting stolen data and only releasing it after the extortionists' demands are met. Another component of this crime is threatening to publish the victims' sensitive data if they do not cooperate and pay the ransom. A current example of this taking place in the USA...

Alexa, are you spying on me? Siri, Alexa, Google Home & co are listening in!

I am sure you know the feeling: you are lying in bed and have forgotten to turn off the light. It was so cosy just now; do you really want to get up again? Smart home devices can cure this and countless other problems. Siri, Alexa and others have already moved in with many people. The smart home speakers are in the living room, bedroom, children's room...

REvil Ransomware

A new hacking group is currently making a name for itself internationally: REvil, or Sodinokibi. The group first emerged in spring 2019, and they appear to be a successor to the group behind the GandCrab ransomware. GandCrab was one of the most effective ransomware campaigns of 2018 to mid-2019. Ransomware is a form of malware installed...

How an attentive employee prevented a cyberattack on the drinking water supply in Oldsmar, Florida

In early February this year, the 15,000 residents of Oldsmar, Florida, escaped having their drinking water poisoned because an employee noticed suspicious activity and prevented it from...

Why you shouldn’t post your children’s pictures on social media

In the 21st century, posting pictures of your kids on various social media sights sites is the new normal. The average child has a digital footprint before the first tooth shows up. Some children even have a digital footprint before they are even born; that happens when the parents post...

Creating secure passwords

What would you say if asked whether you think your password is secure? No? Then there is an urgent need to take action to remedy this. Every year, number combinations such as 123456 top the list of Germany's most frequently used passwords....

Hash Functions and Information Security

Some things we miraculously find all around us once we have discovered them, even though we never noticed them before. Hash functions are a good example of this. They are an important ingredient...