Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem Leben verankert ist. Wir speichern…
A blog about IT, security and whatever crosses my mind
Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem Leben verankert ist. Wir speichern…
I got my first certification in Information Security! Here is everything you need to know about the process, the exam and the final steps to this short experience I made.…
It’s that time of the year again, where my brain starts working on how to best spend my time and energy for the next 12 months. I skipped these types…
Recently, my workplace provided interested employees with a YubiKey, a small security key that provides “Two-Factor Authentication” to computers and mobile devices. It is not the first YubiKey I own,…
A few years ago, I made a blog post about a technique called “tab nabbing”, which can be used to trick the user into entering their data into a phishing…
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
If you extensively use Docker on your machine, you might have noticed how unused instances take up a lot of space on your hard drive. Especially if you do not…
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science” in my region, which is a local event that allows researchers, companies, and other to present something to the public.…
I hate bad grammar. I hate typos. Not only that, but I have a rare case of “something in this text is triggering my brain”, which happens whenever my eyes…