Knowledge base

Explanations of terms and information from the world of IT security

Our knowledge database provides you with valuable information on various topics in the field of IT security. Find out which dangers exist and how you can specifically counter the threat situations to ward off CEO fraud, ransomware, phishing and the like. In addition, you receive an overview of relevant terms in the field of information security.

Hornetsecurity Podcast

Brute-Force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Here, the attacker tries a variety of …

GoBD

GoBD are the Principles for properly maintaining, keeping and storing books, records and documents in electronic form and for data access, as provided …

Cryptolocker Ransomware

The cryptolocker ransomware was a polymorphic virus, which was used to encrypted computer systems. The only option affected …

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals …

Email encryption basics

Hornetsecurity explains the basics of email encryption for businesses. From PGP to TLS and S/MIME to certificates and signatures …

Ransomware Kill Chain (1)

Why ransomware is not a typical cyberattack? Normally, the data theft remains undetected. This is especially true when the systems …

Ransomware Kill Chain (2)

How to use the Ransomware Kill Chain model to devise countermeasures? The Ransomware Kill Chain using Wanna Cry as an example …

The most important IT news. Read our latest blog posts

The hacker: made in Hollywood?

The hacker: made in Hollywood?

A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…