Knowledge base

Explanations of terms and information from the world of IT security

Our knowledge database provides you with valuable information on various topics in the field of IT security. Learn which dangers exist and how you can specifically counter these threats to ward off CEO fraud, ransomware, phishing and the like. In addition, you’ll find an overview of relevant terms in the field of information security.

Hornetsecurity Podcast

Brute-Force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Here, the attacker tries a variety of …

GoBD

GoBD are the Principles for properly maintaining, keeping and storing books, records and documents in electronic form and for data access, as provided …

Cryptolocker Ransomware

The cryptolocker ransomware was a polymorphic virus, which was used to encrypt computer systems. The only option affected …

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals …

Email encryption basics

Hornetsecurity explains the basics of email encryption for businesses. From PGP to TLS and S/MIME to certificates and signatures …

Ransomware Kill Chain (1)

Why is ransomware not a typical cyberattack? Normally, the data theft remains undetected. This is especially true when the systems …

Ransomware Kill Chain (2)

How to use the Ransomware Kill Chain model to devise countermeasures? The Ransomware Kill Chain using Wanna Cry as an example …

Ransomware

The word “ransomware” comes from the English language and contains the term “ransom”, which means “held hostage for money”…

Phishing

Phishing is an electronically executed fraud attempt in which the recipient is sent a fake e-mail that he often does not recognize as such at first…

The most important IT news. Read our latest blog posts

A Journey Through the History of Cryptography – Part 3

A Journey Through the History of Cryptography – Part 3

Our journey through the history of cryptography is coming to an end, but we still have a few last stations ahead of us. First we dealt with symmetric encryption and the encryption methods of Data Encryption Standard (DES) and Advanced Encryption Standard (AES), and in the last blog we introduced asymmetric encryption. In our final piece of the Cryptography triology, we will dive deeper into asymmetric encryption. Attack techniques such as man-in-the-middle attacks and brute force attacks will be examined. Finally, we will present a wide view into the future – keyword: quantum cryptography…
Energy Sector: Number One Cyber-Attack Target

Energy Sector: Number One Cyber-Attack Target

Which industries are most frequently affected by cyber attacks and what attack techniques are they exposed to? By analyzing around 1,000 domains with the largest email volume, the security experts at Hornetsecurity were able to identify the top 10 industries that were particularly targeted by cyber attacks via email in 2019. The energy sector turned out to be extremely threatened, as it is the number one target of attacks.