Wireless Networks and Their Safety

Nowadays, lots of data go through wireless networks. A lot of people don’t pay attention to the fact that third parties might be able to join these networks to snoop around and read this data when not properly encrypted. Decryption tools are getting more and more sophisticated so it is very important to only use wireless networks that have a sufficient grade of protection.

(more…)

0 Comments

Brute force attacks

I have been running into the term “brute-force attacks” quite a lot during my journey into cybersecurity. Brute-force attacks are used when you want to crack someone’s password to obtain unauthorized access. I understand what they do but I never invested a lot of time in getting a full grasp of how brute-force attacks work. 

(more…)

0 Comments

Using KeePass Part 1 -setting up a password database

I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up

(more…)

0 Comments

Protecting your privacy – Internet Browsing History

When I open my Google Chrome browser, I know there are certain risks involved when I enter “Battlefield Internet”. But like a lot of people out there, I have a busy job and when I get home I’m tired and I don’t want to bother about things that don’t immediately impact my general life. This type of unawareness is exactly what web specialized companies (legal) and cyber criminals (illegal) take advantage of with only one goal: financial benefits.

(more…)

0 Comments

Protecting your privacy and your data on public WiFi against attackers

Everybody loves free (digital) services. But as many people know, these so-called free services have a catch most of the time and are not completely free. Unfortunately, not everybody is a good samaritan. The devil is in the details and these details are in complicated Terms and Conditions that nobody reads. Additionally, free services can lack proper security measures. A good example is the free WiFi service. In this post, I will provide tips on how to protect your privacy and your data against attackers on public WiFi.

(more…)

0 Comments