Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem Leben verankert ist. Wir speichern…
A blog about IT, security and whatever crosses my mind
Wem vertrauen wir als Verbraucher am Meisten unsere Daten an? Wer da nicht direkt an das Smartphone denkt, vergisst, wie zentral das Gerät in unserem Leben verankert ist. Wir speichern…
I got my first certification in Information Security! Here is everything you need to know about the process, the exam and the final steps to this short experience I made.…
Recently, my workplace provided interested employees with a YubiKey, a small security key that provides “Two-Factor Authentication” to computers and mobile devices. It is not the first YubiKey I own,…
A few years ago, I made a blog post about a technique called “tab nabbing”, which can be used to trick the user into entering their data into a phishing…
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science” in my region, which is a local event that allows researchers, companies, and other to present something to the public.…
Most of my posts in this blog are based on Scratch your own itch projects: When you have a problem and you work on a solution, then later you realize…
One definition of hackers includes the interest in understanding how things work. Android apps are such things that many people use but few people know how they work. I always…
I wanted to know this for such a long time and never had enough motivation to look it up properly. Turns out it is so easy that no one ever…