100!
Today marks 3 years since I wrote my first blog. When I hit the publish button this will be my one hundredth blog post. It's mainly the last one and a half year
Blogger | Security awareness | Ethical Hacker | AppSec | InfoSec | online privacy | Sports: cycling, running,... | a good pint of beer & other random stuff
Today marks 3 years since I wrote my first blog. When I hit the publish button this will be my one hundredth blog post. It's mainly the last one and a half year
If you're a security practitioner I guess this title grabbed your attention immediately. Because we all know that password reuse is a bad security practice and people shouldn't reuse passwords, right? Damn right!
A website is a company’s online business card. It’s a bad sight when it’s poorly designed and developed and users consequentially encounter a lot of difficulties using it. Luckily a
It's been a week since I wrote my last blog. I needed a bit of a break after 31 consecutive days of blogging. In this blog I'll look back on my "adventure". How
This is the 31st and last post in my Cyber Security Awareness Month blog series. I will do a short recap of what I covered in this series, but I also want to
Most people have a lot of internet connected devices at home. Obviously computers, laptops, tablets and smartphones, but it doesn't stop there. TVs, dishwashers, kettles, wearables, toys and even toilets all have smart,
Out of date or not regularly updated operating systems and applications put you at risk because they have a lot of vulnerabilities. Many of these vulnerabilities can be easily detected and exploited by
In previous posts in this series I covered how to create strong passwords, how to enable multi-factor authentication, and how to do this in such a way that you don't lock yourself out
Using social media is not as innocent as it looks. There are several security and privacy risks lurking around the corner. It's important to be on your guard. In this post I'll give
In these series I covered already several forms of online crime, for instance ransomware, phishing and tech support scams. They all have something in common, deception techniques. Criminals try in every possible way
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
What do you do if you want to know more about someone? You'll do a search on their name in your favorite search engine, right? And your image about that person will be