Security and privacy enhancing tools
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
A collection of 48 posts
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
In this blog I will give you some tips that can help you to do your online shopping as secure as possible. Don't let criminals get away with your hard-earned money.
Third party apps that have access to your online accounts can pose a security and privacy risk if they have excessive permissions or when they get hacked. Read here how you can control the risk.
The more online accounts you have the bigger the potential security risks. Read this blog for tips on how to delete the online accounts that you no longer need.
The more software you're running on your devices the bigger the potential security risks. Read this blog to learn more about how and why you should remove unused and unnecessary software.
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
With the blogs in this series I want to reach not only my typical audience, security professionals, but especially less security aware people to help them improve their personal security. If you think
I regularly get questions about how to build a career in information security. I decided to do a short write-up with some tips and resources because I think there's a need for it
It took me a while, but here's finally a recap of BSides Manchester. Together with my mates from the Beerfarmers we gave a talk named "Rage against the FUD". I think the name
This blog contains a list of information security resources tailored to the average user. It will be regularly updated
A lot of online sharing services have this convenient feature to share content via an unguessable link. Even if the recipient of the link doesn't have an account for the used service he