I've sent my first newsletter yesterday. It's a newsletter in which I capture the security news that caught my attention in the past week. It can be really anything security related that interests
Review of my Information Security adventures of 2019 and a preview of 2020. Happy New Year!
Today marks 3 years since I wrote my first blog. When I hit the publish button this will be my one hundredth blog post. It's mainly the last one and a half year
If you're a security practitioner I guess this title grabbed your attention immediately. Because we all know that password reuse is a bad security practice and people shouldn't reuse passwords, right? Damn right!
A website is a company’s online business card. It’s a bad sight when it’s poorly designed and developed and users consequentially encounter a lot of difficulties using it. Luckily a
It's been a week since I wrote my last blog. I needed a bit of a break after 31 consecutive days of blogging. In this blog I'll look back on my "adventure". How
This is the 31st and last post in my Cyber Security Awareness Month blog series. I will do a short recap of what I covered in this series, but I also want to
Most people have a lot of internet connected devices at home. Obviously computers, laptops, tablets and smartphones, but it doesn't stop there. TVs, dishwashers, kettles, wearables, toys and even toilets all have smart,
Out of date or not regularly updated operating systems and applications put you at risk because they have a lot of vulnerabilities. Many of these vulnerabilities can be easily detected and exploited by
In previous posts in this series I covered how to create strong passwords, how to enable multi-factor authentication, and how to do this in such a way that you don't lock yourself out
Using social media is not as innocent as it looks. There are several security and privacy risks lurking around the corner. It's important to be on your guard. In this post I'll give
In these series I covered already several forms of online crime, for instance ransomware, phishing and tech support scams. They all have something in common, deception techniques. Criminals try in every possible way