Knowledge base

Explanations of terms and information from the world of IT security

Our knowledge database provides you with valuable information on various topics in the field of IT security. Learn which dangers exist and how you can specifically counter these threats to ward off CEO fraud, ransomware, phishing and the like. In addition, you’ll find an overview of relevant terms in the field of information security.

Hornetsecurity Podcast

Brute-Force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Here, the attacker tries a variety of …

GoBD

GoBD are the Principles for properly maintaining, keeping and storing books, records and documents in electronic form and for data access, as provided …

Cryptolocker Ransomware

The cryptolocker ransomware was a polymorphic virus, which was used to encrypt computer systems. The only option affected …

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals …

Email encryption basics

Hornetsecurity explains the basics of email encryption for businesses. From PGP to TLS and S/MIME to certificates and signatures …

Ransomware Kill Chain (1)

Why is ransomware not a typical cyberattack? Normally, the data theft remains undetected. This is especially true when the systems …

Ransomware Kill Chain (2)

How to use the Ransomware Kill Chain model to devise countermeasures? The Ransomware Kill Chain using Wanna Cry as an example …

Ransomware

The word “ransomware” comes from the English language and contains the term “ransom”, which means “held hostage for money”…

Phishing

Phishing is an electronically executed fraud attempt in which the recipient is sent a fake e-mail that he often does not recognize as such at first…

The most important IT news. Read our latest blog posts

Knowledge Base

Security gaps in the home office? The challenge of IT security in times of crisis

The number of coronavirus infections are increasing each day, which has resulted in drastic countermeasures. Shops, restaurants and other public places are staying closed to prevent the spread of the virus. Companies are asking their employees to work from their homes. During this extraordinary and sometimes overwhelming situation, companies and employees should not have to face additional fears about IT security in the home office. Hornetsecurity has some recommendations for this.
Knowledge Base

Hornetsecurity and api jointly launch Cloud Security for Office 365 in reseller channels

Hornetsecurity forms their next important partnership with api Computerhandels GmbH as the third distributor to further increase the penetration of the German IT retail market. The cooperation has strategic advantages for both sides: While Hornetsecurity is once again significantly increasing its presence in the German channel and at the same time gaining access to other European markets, api is expanding its portfolio of value-added services to include important security elements.
Knowledge Base

Mysterious spam campaign: A security analysis

A recent case has not only puzzled researchers at Hornetsecurity Security Lab, but also other security analysts: In a current email spam campaign in which malicious Excel documents are delivered in zipped archives, only the Windows calculator application ultimately starts when the analysis is performed on the security experts’ computers. Our Security Lab uncovers what exactly lies behind the scam and what possible target the attackers are trying to exploit.