Attention, pests!

Beware of treacherous short messages

Beware of treacherous short messages

Fraudulent texts often look as if they have come from a well-known company. How to stay safe from scammers’ tricks.

Viren-trojaner

Detect and banish viruses, Trojans, and malware

Something is wrong with the computer. How to handle a possible attack and minimize data loss with cool deliberation.

Phishing-neu

What you need to know about phishing

Phishing emails look deceptively genuine. How to know when someone is faking their identity.

Call-ID-Spoofing

Caller ID spoofing – when callers use a bogus number

This scam involves callers who say they are with the police or work for a bank. Protect yourself from criminals using common sense.

Identitätsdiebstahl

Identity theft on the Internet – how to act correctly

If someone uses your personal data on the Internet, it can be expensive. Read our tips on how to protect yourself from identity theft and how those affected can react appropriately.

sicher-mit-Mails-umgehen-en

How to handle email securely

If an infected email is simply deleted, nothing can happen. More caution will keep you immune to Trojans and viruses.

FAQ Share
Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.