Sim Swapping

Almost everybody owns a mobile phone these days. By using a mobile phone, you automatically run a cybersecurity risk. One of the most notorious mobile phone attacks, next to phishing by SMS, is SIM swapping.

(more…)

0 Comments

Password Hashing: How Databases Protect Your Passwords

May 5th is Liberation Day in my country (the Netherlands). Although the Allies did not fully liberate The Netherlands in August 1945. Soon after the war, the Dutch government decided that Liberation Day would take place on May 5th, the date of the German army’s defeat.  This year, May 5th was on Thursday and the first Thursday of May is also known as World Password Day.

(more…)

0 Comments

Using KeePass Part 1 -setting up a password database

I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up

(more…)

0 Comments

Protecting your privacy – Internet Browsing History

When I open my Google Chrome browser, I know there are certain risks involved when I enter “Battlefield Internet”. But like a lot of people out there, I have a busy job and when I get home I’m tired and I don’t want to bother about things that don’t immediately impact my general life. This type of unawareness is exactly what web specialized companies (legal) and cyber criminals (illegal) take advantage of with only one goal: financial benefits.

(more…)

0 Comments