Jump:

SWITCH Security Blog

SWITCH Security Blog

More information:

Contact:

Specialist know-how called for?

We take a detailed look at the different types of attack launched by cyber criminals on the basis of practical examples. What is needed to understand these? Fundamental IT knowledge plus a little time to study our articles (available solely in German).

Smartphone security: iPhone case study
Today's mobile phones are far from just being for telephoning. Yet, as they become more widespread, they are also becoming increasingly attractive for internet criminals. We show what dangers can arise for mobile phone users and what individual users can do to keep the risk down to a minimum.

Infected web pages: An analysis
Hacking the websites of companies and private individuals is part of internet criminals' daily business. Today, even experienced web administrators have difficulty in recognising that their website is being used as a "virus spreader". We show you which malicious code the attackers place on the web pages and what consequences this has for visitors.

How secure is Mac OS X? A case study & protective measures
Apple's Mac OS X is considered to be a secure operating system and one that is free from viruses, worms or other malware. But is that really true? On the basis of a case study, we show that attackers also have an easy time with Mac OS X. Learn how a classical drive-by infection could be spread and how a Mac system can be effectively safeguarded.

Lucrative business in fake anti-virus software
Criminals bring fake anti-virus software, so-called scareware, into circulation millions of times over. On the victims' computers, the scareware not only gives rise to disturbing pop-ups but also creates false messages. The following report shows what lies behind the scareware scam operated by Internet criminals.

Correct anonymisation with Word and PDF
Just a harmless document can contain more information than its author would welcome: whether this be blacked-out sections of text, confidential information, significant names or company data that the author thought had been deleted. Here you will see how document security can be enhanced for business or private applications.

From a patch to an exploit – a case study
We show how attackers can automatically develop their own exploits from manufacturers' security updates. Patch analyses of this type help CERT teams worldwide assess weak points.

Drive-by Infection: Concept & Case study
Since cyber criminals selectively exploit security gaps in a browser, Internet users can catch dangerous malware "in passing" as they surf in the Internet. On page 31 you can find out how attacks of this type work, how attackers manipulate websites, and what means of protection are available.

PC Updating: Rapid, efficient and secure
Anyone who relies on the automatic update function of their PC can end up paying a high price: in many cases, cyber criminals deliberately target weak points in the software that are not checked during the update. We show you how you can effectively protect your PC by the simplest of means.