{"id":10124,"date":"2025-01-20T17:37:24","date_gmt":"2025-01-20T16:37:24","guid":{"rendered":"https:\/\/netxconsult.de\/blog\/attack-techniques-revealed-this-is-how-hackers-work\/"},"modified":"2025-01-20T17:48:39","modified_gmt":"2025-01-20T16:48:39","slug":"attack-techniques-uncovered-this-is-how-hackers-work","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/","title":{"rendered":"Attack Techniques Uncovered &#8211; This Is How Hackers Work!"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>It&#8217;s no secret that hackers are becoming more and more successful. Why is that?<br \/>\nAttack techniques are becoming more and more sophisticated and many people know too little about them.<br \/>\nToday we are shedding some light on the subject! We also show you what you can do if you are faced with one of these threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">The Best-Known Techniques<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(248,96,17,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#f86011;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#ffffff;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-10124-1\"><div class=\"fusion-panel panel-default panel-503bb86f814313ed1 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_503bb86f814313ed1\"><a aria-expanded=\"false\" aria-controls=\"503bb86f814313ed1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-1\" data-target=\"#503bb86f814313ed1\" href=\"#503bb86f814313ed1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Viruses<\/span><\/a><\/h4><\/div><div id=\"503bb86f814313ed1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_503bb86f814313ed1\"><div class=\"panel-body toggle-content fusion-clearfix\">Medical definition: Viruses are infectious organic structures that spread as virions outside cells by transmission, but as viruses can only multiply within a suitable host cell.<\/p>\n<div>\n<div>\n<div>\n<p>Computer viruses are infectious structures that spread outside computers as malware programs, but can only multiply as viruses within a suitable host computer.<\/p>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Meaning: A virus is &#8220;harmless&#8221; as long as you don&#8217;t catch it and let it into your computer. <\/span><\/p>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">An example from everyday life: as long as you do not open an email attachment containing the virus, the virus cannot do anything.<\/span><\/p>\n<p>So simply delete the email and the disaster can be averted.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-8c8a477566ea4a60d fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_8c8a477566ea4a60d\"><a aria-expanded=\"false\" aria-controls=\"8c8a477566ea4a60d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-1\" data-target=\"#8c8a477566ea4a60d\" href=\"#8c8a477566ea4a60d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Trojan horse<\/span><\/a><\/h4><\/div><div id=\"8c8a477566ea4a60d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_8c8a477566ea4a60d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Most people are probably familiar with the wooden building with hidden soldiers for the city of Troy. And everyone knows how the story ended. Trojans hide themselves in &#8220;useful&#8221; programs or documents. As with viruses, they only activate themselves when they are called up or opened. Unlike a virus, a Trojan can act independently of its program and cause damage. However, it cannot copy itself and does not spread independently. And unfortunately it is not enough to destroy the Trojan horse &#8211; because the soldiers are already inside. The usual Trojans try to pass on data such as passwords or credit card numbers to the Agamemnon\/Odysseus of the Trojan, i.e. the author. However, many also have ransomware that releases the data they have encrypted in return for a ransom.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-538edfb9530acd8bc fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_538edfb9530acd8bc\"><a aria-expanded=\"false\" aria-controls=\"538edfb9530acd8bc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-1\" data-target=\"#538edfb9530acd8bc\" href=\"#538edfb9530acd8bc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Phishing<\/span><\/a><\/h4><\/div><div id=\"538edfb9530acd8bc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_538edfb9530acd8bc\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The best-known bait in phishing is probably the fake email. It has a link to the &#8220;account&#8221; of the victim&#8217;s bank or online store, where they are supposed to confirm something or cancel a purchase. However, there are other lures that have become more common recently: fake text messages (also known as smishing) and websites. The same principle, just a different approach. If you fall for it, your login details and other personal data are spied on and exploited. Needless to say, this will not be in the victim&#8217;s best interest. How can you protect yourself against phishing? Watch out: Is the source trustworthy? The destination? For example, is the URL of the link reputable? What do you do if you realize that it is a phishing attack?<\/p>\n<p><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">Don&#8217;t just carry on! <\/span><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing); background-color: rgba(255, 255, 255, 0);\">Instead, as with all cyber attacks, inform the IT department.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" alt=\"Die bekanntesten Hacker Techniken\" title=\"Die bekanntesten Hacker Techniken\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Die-bekanntesten-Hacker-Techniken.jpg\" class=\"img-responsive wp-image-7431\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Die-bekanntesten-Hacker-Techniken-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Die-bekanntesten-Hacker-Techniken-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Die-bekanntesten-Hacker-Techniken-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Die-bekanntesten-Hacker-Techniken.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">The Slow Burning Spies<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(0,0,0,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#f86011;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#000000;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-10124-2\"><div class=\"fusion-panel panel-default panel-d19b9b49e7b35f74c fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_d19b9b49e7b35f74c\"><a aria-expanded=\"false\" aria-controls=\"d19b9b49e7b35f74c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-2\" data-target=\"#d19b9b49e7b35f74c\" href=\"#d19b9b49e7b35f74c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Sniffing<\/span><\/a><\/h4><\/div><div id=\"d19b9b49e7b35f74c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_d19b9b49e7b35f74c\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The eavesdropper on the wall hears his own shame&#8230; or information to launch an attack. It depends. Sniffer software monitors data traffic in real time. This is not a bad thing in itself, because you can use such software to detect anomalies. But where there is light, there are also shadows. And so this type of software is also used by cyber criminals. Unencrypted or weakly encrypted passwords are easily intercepted. Or it can be used to find out which protocols are used by whom to communicate with whom. And cyber criminals can use this information to launch the actual attack. How do you protect yourself? As sniffing attacks are very difficult to detect, preventive measures are best. Be careful; don&#8217;t download everything just because you can; don&#8217;t use insecure connections; have secure passwords (change them regularly); keep firewalls installed and up-to-date; etc. The benefits of awareness training are of course undeniable. If you need a good instructor, just fill out the contact form.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-c82c0887de6df244e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c82c0887de6df244e\"><a aria-expanded=\"false\" aria-controls=\"c82c0887de6df244e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-2\" data-target=\"#c82c0887de6df244e\" href=\"#c82c0887de6df244e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Worms<\/span><\/a><\/h4><\/div><div id=\"c82c0887de6df244e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c82c0887de6df244e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Unlike viruses, they do not need a computer host. <\/span><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">And unlike Trojans, they can copy and spread themselves.<\/span><\/p>\n<p>Worms search the address lists of e-mail contacts and send an e-mail with a copy of themselves. <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">They can also install other malware programs or security holes (a wormhole, if you like) and are often combined with a virus or Trojan.<\/span><\/p>\n<p>For example, the infamous &#8220;Wannacry&#8221; crypto Trojan included a network worm. It sent a copy of itself to the first 50 email contacts and installed the DoublePulsar backdoor. (Incidentally, this incident is an excellent example of how important it is to install security updates early &#8211; immediately). So here are some questions for self-checking:<\/p>\n<ul>\n<li>Is my computer up to date with the latest software?<\/li>\n<li>Have I not yet installed any security updates?<\/li>\n<\/ul>\n<p>Am I taking this seriously?<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-d48c7b690159b0696 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_d48c7b690159b0696\"><a aria-expanded=\"false\" aria-controls=\"d48c7b690159b0696\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-2\" data-target=\"#d48c7b690159b0696\" href=\"#d48c7b690159b0696\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Spyware<\/span><\/a><\/h4><\/div><div id=\"d48c7b690159b0696\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_d48c7b690159b0696\"><div class=\"panel-body toggle-content fusion-clearfix\">James Bond and Mission Impossible have made &#8220;being a spy&#8221; a dream job for many people. But if you&#8217;re not the spy yourself, but the one being spied on, that&#8217;s a completely different story! If you have spyware on your computer, that&#8217;s exactly what you are. This spyware collects information about you, your browser and Internet activities as well as other data and forwards it to its writer. What does it do with it? For example, to display targeted advertising to urge you to make a purchase or to send spam emails or to empty bank accounts with the available data or to blackmail people with images\/documents\/videos or to steal identities with personal data or, or, or &#8230; The possibilities are endless! As with any good spy, you don&#8217;t realize it&#8217;s there. And the same applies to such software. So if you even suspect spyware on your device, you should react as quickly as possible (contact your IT department in business) and get an appropriate cyber security program. This should then thoroughly remove every bit of spyware.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">Those Who Pretend <span class=\"hljs-keyword\">to<\/span> Be Someone <span class=\"hljs-keyword\">Else<\/span><\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(0,0,0,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#f86011;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#f86011;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-10124-3\"><div class=\"fusion-panel panel-default panel-b04045d03d96ef5f1 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b04045d03d96ef5f1\"><a aria-expanded=\"false\" aria-controls=\"b04045d03d96ef5f1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-3\" data-target=\"#b04045d03d96ef5f1\" href=\"#b04045d03d96ef5f1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Spoofing<\/span><\/a><\/h4><\/div><div id=\"b04045d03d96ef5f1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b04045d03d96ef5f1\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>There are four different types: &#8211; IP spoofing: Fake IP address so that the attacked computer thinks the data packets are coming from a trusted, known computer. It is used for man-in-the-middle attacks. &#8211; DNS spoofing: The assignment of the IP address to the corresponding domain name is falsified and the data traffic is redirected to another computer. It is used for phishing. &#8211; Mail spoofing: A false e-mail sender address is displayed. There is probably no need to explain what this can be used for. &#8211; Call ID spoofing: A fake or stolen telephone number is displayed during the call. This makes it impossible to trace who has called and possibly obtained private confidential data. Here too, the following applies: check at the outset whether the email\/link\/caller is legitimate. Do not naively believe everything you are told.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-266a25d1d68fd6736 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_266a25d1d68fd6736\"><a aria-expanded=\"false\" aria-controls=\"266a25d1d68fd6736\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-3\" data-target=\"#266a25d1d68fd6736\" href=\"#266a25d1d68fd6736\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Social engineering<\/span><\/a><\/h4><\/div><div id=\"266a25d1d68fd6736\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_266a25d1d68fd6736\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In movies, when the young woman simply believes the shady villain, you grab your head and scream: &#8220;NOOOOO!&#8221; But giving your personal data or bank details to a buyer who has a very secure payment method is of course completely legitimate. Yes&#8230; the social engineers have it in them. And they are becoming ever more cunning. Social engineering is flourishing like never before. You&#8217;d think that in our enlightened times, nobody would fall for it anymore. Wrong. People&#8217;s tendency to trust and their willingness to help are often exploited quickly and effectively. Calls from a hacked bank or from grandchildren in need of help, emails from landlords with new bank accounts, very friendly buyers with foolproof payment methods, &#8230; there is much more. There are plenty of videos on the Internet from whitehats (the good hackers) that show how quickly and easily personal and sensitive data can be obtained using social engineering. What helps? Three words: IT security awareness training.<\/p>\n<p><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Anyone who wants to increase awareness among themselves and their employees is welcome to contact us.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-2156fc3e35f83055e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2156fc3e35f83055e\"><a aria-expanded=\"false\" aria-controls=\"2156fc3e35f83055e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-3\" data-target=\"#2156fc3e35f83055e\" href=\"#2156fc3e35f83055e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Man-in-the-middle<\/span><\/a><\/h4><\/div><div id=\"2156fc3e35f83055e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2156fc3e35f83055e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Normally, nobody likes to be caught between two stools. Or likes being the third wheel. But in the case of the man-in-the-middle attack, the attacker really likes being the third wheel. The attacker &#8220;sits&#8221; between two (or more) computers that are communicating with each other. However, he doesn&#8217;t just listen, but controls and\/or manipulates the data traffic. They can intercept and read the exchanged information or cut off the forwarding. And much more besides. But nobody notices any of this. You think you are actually communicating with the person you want to. The &#8220;man-in-the-middle&#8221; is like a manipulative stalker. How do you give this stalker access? He gains access himself, to the networks connected to the computers. A popular method is to pretend to be a WLAN access point. Or the cybercriminal places himself between the bank server and the user&#8217;s browser and receives a signal when the user wants to log in to his bank account. Therefore: Please only use SSL\/TLS-secured connections! Please DO NOT use freely accessible VPNs or proxy servers!<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" alt=\"Methode Identi\u00e4t verschleier\" title=\"Methode Identit\u00e4t verschleiern\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Methode-Identitaet-verschleiern.jpg\" class=\"img-responsive wp-image-7433\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Methode-Identitaet-verschleiern-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Methode-Identitaet-verschleiern-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Methode-Identitaet-verschleiern-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Methode-Identitaet-verschleiern.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.26;\">The Often Forgotten Methods<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(0,0,0,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#f86011;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#f86011;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-10124-4\"><div class=\"fusion-panel panel-default panel-95bf79df56c46d31e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_95bf79df56c46d31e\"><a aria-expanded=\"false\" aria-controls=\"95bf79df56c46d31e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-4\" data-target=\"#95bf79df56c46d31e\" href=\"#95bf79df56c46d31e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Scareware<\/span><\/a><\/h4><\/div><div id=\"95bf79df56c46d31e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_95bf79df56c46d31e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>If you&#8217;re constantly told that you&#8217;re ill, you&#8217;ll believe it at some point. And you buy medicine or go to the doctor. This is exactly what scareware does. This malware uses warning messages about alleged security risks to convince you that something is wrong and that you urgently need this or that product (malvertising). Please sign here and pay so and so much. That&#8217;s the best case scenario. The worst case would be if you catch another malware with the useless newly installed program. Scareware is also often associated with social engineering, so that the &#8220;curative&#8221; product is branded with the logos of reputable cybersecurity programs. Or it is displayed how much of the computer has already been &#8220;scanned&#8221;. This is all intended to reassure you and give the program enough time to install itself. Then &#8220;the cat owns you&#8221;. As with spyware, you need a cyber security program (this time a real one) to remove scareware.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-673cb0377693e0e1e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_673cb0377693e0e1e\"><a aria-expanded=\"false\" aria-controls=\"673cb0377693e0e1e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-4\" data-target=\"#673cb0377693e0e1e\" href=\"#673cb0377693e0e1e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">DoS<\/span><\/a><\/h4><\/div><div id=\"673cb0377693e0e1e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_673cb0377693e0e1e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The straw that broke the camel&#8217;s back&#8230; (seemingly) small things can have a big impact. The DoS attack (#denialofservice) uses precisely this principle. An online store, for example, is bombarded with so many requests that the system collapses. Amazon and Yahoo have already been paralyzed in this way. This type of attack used to be more common, but now they have become less frequent. But that doesn&#8217;t mean they should be underestimated today. After all, a non-functioning online store is a no-go. How do you ward off such an attack? The best way is through prevention. Install a security system beforehand &#8211; if everything is still good. This then recognizes IP reputation, frequent attack patterns and previous data and can thus distinguish an attack from high traffic. Such a system intelligently reduces malicious bot traffic and absorbs the rest of the data traffic.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-170e678549a72c8b5 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_170e678549a72c8b5\"><a aria-expanded=\"false\" aria-controls=\"170e678549a72c8b5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-10124-4\" data-target=\"#170e678549a72c8b5\" href=\"#170e678549a72c8b5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Backdoor<\/span><\/a><\/h4><\/div><div id=\"170e678549a72c8b5\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_170e678549a72c8b5\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>A backdoor in the IT sector is software that allows the author to gain access to the computer or a protected function of the computer by bypassing the security devices. In principle, a secret passageway is created in the house and then cyber criminals can enter and leave through such a stylish secret door in the bookshelf. And your security and alarm system won&#8217;t notice a thing. Unlike a Trojan: if you delete this backdoor, no one can access your computer. So if you&#8217;re worried that there&#8217;s a secret door somewhere in your house &#8211; find it and wall it up!<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>Yes, the methods used by hackers are varied and sophisticated. What can help? Always be informed and alert yourself and keep your eyes open.<br \/>\nAnd as a manager: make sure that your employees are aware of the dangers and learn how to act correctly. Do you want to know how secure YOUR company is? Do you want independent advice on how and what can be implemented? Let&#8217;s talk about it!<\/p>\n<p><a href=\"https:\/\/netxconsult.de\/en\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">Simply ring through without obligation or leave an e-mail!<\/a><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" alt=\"Hacker sind gut ger\u00fcstet\" title=\"Hacker sind gut ger\u00fcstet\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Hacker-sind-gut-geruestet.jpg\" class=\"img-responsive wp-image-7436\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Hacker-sind-gut-geruestet-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Hacker-sind-gut-geruestet-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Hacker-sind-gut-geruestet-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Hacker-sind-gut-geruestet.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 801px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":7439,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[247],"tags":[],"class_list":["post-10124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attack Techniques Uncovered - This Is How Hackers Work! - netX consult<\/title>\n<meta name=\"description\" content=\"Hackers&#039; attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack Techniques Uncovered - This Is How Hackers Work! - netX consult\" \/>\n<meta property=\"og:description\" content=\"Hackers&#039; attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-20T16:37:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-20T16:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vanessa Daugherty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vanessa Daugherty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/\"},\"author\":{\"name\":\"Vanessa Daugherty\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\"},\"headline\":\"Attack Techniques Uncovered &#8211; This Is How Hackers Work!\",\"datePublished\":\"2025-01-20T16:37:24+00:00\",\"dateModified\":\"2025-01-20T16:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/\"},\"wordCount\":8412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Angriffstechniken-Titelbild.jpg\",\"articleSection\":[\"IT security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/\",\"name\":\"Attack Techniques Uncovered - This Is How Hackers Work! - netX consult\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Angriffstechniken-Titelbild.jpg\",\"datePublished\":\"2025-01-20T16:37:24+00:00\",\"dateModified\":\"2025-01-20T16:48:39+00:00\",\"description\":\"Hackers' attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Angriffstechniken-Titelbild.jpg\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Angriffstechniken-Titelbild.jpg\",\"width\":1800,\"height\":1200,\"caption\":\"Angriffstechniken aufgedeckt\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/attack-techniques-uncovered-this-is-how-hackers-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attack Techniques Uncovered &#8211; This Is How Hackers Work!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\",\"name\":\"Vanessa Daugherty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"caption\":\"Vanessa Daugherty\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/vanessanetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attack Techniques Uncovered - This Is How Hackers Work! - netX consult","description":"Hackers' attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/","og_locale":"en_US","og_type":"article","og_title":"Attack Techniques Uncovered - This Is How Hackers Work! - netX consult","og_description":"Hackers' attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...","og_url":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/","og_site_name":"netX consult","article_published_time":"2025-01-20T16:37:24+00:00","article_modified_time":"2025-01-20T16:48:39+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg","type":"image\/jpeg"}],"author":"Vanessa Daugherty","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vanessa Daugherty","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/"},"author":{"name":"Vanessa Daugherty","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249"},"headline":"Attack Techniques Uncovered &#8211; This Is How Hackers Work!","datePublished":"2025-01-20T16:37:24+00:00","dateModified":"2025-01-20T16:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/"},"wordCount":8412,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg","articleSection":["IT security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/","url":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/","name":"Attack Techniques Uncovered - This Is How Hackers Work! - netX consult","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg","datePublished":"2025-01-20T16:37:24+00:00","dateModified":"2025-01-20T16:48:39+00:00","description":"Hackers' attack techniques are becoming increasingly sophisticated. Here we uncover some of the techniques and show how hackers work and ...","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/08\/Angriffstechniken-Titelbild.jpg","width":1800,"height":1200,"caption":"Angriffstechniken aufgedeckt"},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/attack-techniques-uncovered-this-is-how-hackers-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Attack Techniques Uncovered &#8211; This Is How Hackers Work!"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249","name":"Vanessa Daugherty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","caption":"Vanessa Daugherty"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/vanessanetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=10124"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10124\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/7439"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=10124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=10124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=10124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}