Latest articles

ECSM 2019: Preparing and hosting a security CTF contest

In recent weeks, some of us were heavily involved in preparing and hosting a public CTF contest in the context of this year's European Cyber Security Month (ECSM). More than 1,000 teams registered, nearly 600 solved at least one challenge. Unlike most other CTFs, this one was focused on industrial security.

In this article, we give an insight into preparations and hosting of the CTF event, and discuss some lessons learned.

ECSM 2019: Tips for your cyber hygiene

Broadly speaking, hygiene is about maintaining health by doing many different actions such as taking a bath, washing hands and clothes, or cleaning surfaces in rooms. When it comes to “cyber hygiene”—the first of two topics addressed by this year's European Cyber Security Month—we think of “easy actions to keep or improve your level of information security”.

In this article, we present several quick actions to keep or improve your level of information security.

GnuPG for e-mail encryption and signing

GnuPG, originally released 20 years ago, offers encryption for everyone. However, like every piece of software, it neither is flawless nor perfect. Recent attacks like ROCA, SigSpoof, Efail, and signature flooding revived the discussions about its security.

In this article, we present an overview of the current state of GnuPG for e-mail encryption and signing.