Each month, we publish a review that covers essential activities of the last 30 days. This month, we talk about coronavirus-related news, Let’s Encrypt’s certificate revocation, new attacks on hardware, issues with Tor Browser, and more.
In January 2020, we gave another lecture on social engineering and awareness at the University of Regensburg, Germany. During our interactive session, Master students had to invade the privacy of our fictional character Jessika. Each student became a social engineer for this course, and some of them managed to “hack” into Jessika’s GMX mailbox without using “hacking tools”.
This article is about becoming aware of the human factor that is crucial for information security.
Each month, we publish a review that covers the most important activities of the last 30 days. This time, our monthly review actually covers the first two months of 2020. We talk about the 36C3, the end of SHA-1, CRLite in Firefox, the Kr00k attack, and more.
Each month, we publish a review that covers essential activities of the last 30 days. This month, we talk about Python 2 EOL, malicious Python libraries, technical previews by Signal, WebAuthn for iOS, and more.
Some people are convinced that applying cryptography to their product or service solves all problems regarding security and privacy. Of course, this isn’t the case as shown in this article.