Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem…
A blog about IT, security and whatever crosses my mind.
Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem…
I got my first certification in Information Security! Here is everything you need to know about the process, the exam and the final steps to…
Recently, my workplace provided interested employees with a YubiKey, a small security key that provides “Two-Factor Authentication†to computers and mobile devices. It is not…
A few years ago, I made a blog post about a technique called “tab nabbingâ€, which can be used to trick the user into entering…
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science†in my region, which is a local event that allows researchers, companies, and other to…
Most of my posts in this blog are based on Scratch your own itch projects: When you have a problem and you work on a…
One definition of hackers includes the interest in understanding how things work. Android apps are such things that many people use but few people know…
I wanted to know this for such a long time and never had enough motivation to look it up properly. Turns out it is so…