Sim Swapping

Almost everybody owns a mobile phone these days. By using a mobile phone, you automatically run a cybersecurity risk. One of the most notorious mobile phone attacks, next to phishing by SMS, is SIM swapping.

(more…)

0 Comments

Password Hashing: How Databases Protect Your Passwords

May 5th is Liberation Day in my country (the Netherlands). Although the Allies did not fully liberate The Netherlands in August 1945. Soon after the war, the Dutch government decided that Liberation Day would take place on May 5th, the date of the German army’s defeat.  This year, May 5th was on Thursday and the first Thursday of May is also known as World Password Day.

(more…)

0 Comments

Using KeePass Part 1 -setting up a password database

I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up

(more…)

0 Comments