Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem…
A blog about IT, security and whatever crosses my mind.
Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem…
I got my first certification in Information Security! Here is everything you need to know about the process, the exam and the final steps to…
It’s that time of the year again, where my brain starts working on how to best spend my time and energy for the next 12…
Recently, my workplace provided interested employees with a YubiKey, a small security key that provides “Two-Factor Authentication†to computers and mobile devices. It is not…
A few years ago, I made a blog post about a technique called “tab nabbingâ€, which can be used to trick the user into entering…
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
If you extensively use Docker on your machine, you might have noticed how unused instances take up a lot of space on your hard drive.…
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science†in my region, which is a local event that allows researchers, companies, and other to…
I hate bad grammar. I hate typos. Not only that, but I have a rare case of “something in this text is triggering my brainâ€,…