In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
A blog about IT, security and whatever crosses my mind
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science” in my region, which is a local event that allows researchers, companies, and other to present something to the public.…
Most of my posts in this blog are based on Scratch your own itch projects: When you have a problem and you work on a solution, then later you realize…
One definition of hackers includes the interest in understanding how things work. Android apps are such things that many people use but few people know how they work. I always…
I wanted to know this for such a long time and never had enough motivation to look it up properly. Turns out it is so easy that no one ever…
Recently I had the opportunity to participate in a documentary about ransomware. The journalist that conducted the interview (not with me unfortunately) wanted to see how malware in general works…
This post is inspired by a lot of questions I get about emails: Hey I got this strange email the other day… There are different mails that the security community…
IT security is a complex field, which makes protecting goods and data against attacks a really difficult and ongoing challenge. As a security professional, I give lots of people advice…
For my research I had a look at new functionalities of Android, especially related to security. I came across Protected Confirmation, which is a rather interesting method to ask the…