To improve our site for you we would love to record your visit. Of course this is 100% privacy compliant and completely anonymous. Your choice is stored in a cookie. Can we count on you? More...

No OK
cart 0
Phishing: When Criminals go Fishing by e-mail

Phishing: When Criminals go Fishing by e-mail

27. Mar 2018 / Editorial Staff
More and more fraudsters try to lure unsuspecting Internet users to manipulated Internet sites with deceptively genuine phishing e-mails. Anyone who enters access data or passwords here has fallen into the trap.  More and more perfect - more threatening. Read More
Malvertising: Harmful advertising

Malvertising: Harmful advertising

25. Mar 2018 / Editorial Staff
Advertising on the Internet is not only annoying, slows down the page layout and increases the data volume: Sometimes banners and pop-ups even cause real dangers - exactly when so-called malvertising attacks are used. In the childhood days of the Internet, publishers put content for which they had Read More
Cybergangsters Now Tap The Computing Power Of Computers

Cybergangsters Now Tap The Computing Power Of Computers

22. Mar 2018 / Editorial Staff
Cybergangsters are usually keen on credit card data or passwords, now they have their sights set on a new target: stealing computing power, so-called cryptojacking. Hundreds of millions of Internet users have already been affected. Read More
Tips to Prevent Internet threats

Tips to Prevent Internet threats

18. Mar 2018 / Editorial Staff
In the digital age, clever thieves no longer steal handbags or crack cars: they are targeting the data and money of Internet users. The number of people affected has increased, as has the amount of damage. Attackers today know many tricks to get data or money. Read More
eBlocker Privacy Check

eBlocker Privacy Check

09. Mar 2018 / Editorial Staff
Run our Privacy Check page to learn what data your browser is sharing. You’ve probably read that when you are surfing the Internet, you are leaving traces. Read More
10 Steps to Protecting Your Online Privacy

10 Steps to Protecting Your Online Privacy

05. Mar 2018 / Editorial Staff
Restore your online privacy with these 10 steps! Unlike other media, such as radio, TV or print, on the Internet you are constantly leaving traces. Online trackers and advertising networks track your surfing behavior with pinpoint accuracy, on all the websites and devices you use. Read More