Sim Swapping
Almost everybody owns a mobile phone these days. By using a mobile phone, you automatically run a cybersecurity risk. One of the most notorious mobile phone attacks, next to phishing by SMS, is SIM swapping.
(more…)
Almost everybody owns a mobile phone these days. By using a mobile phone, you automatically run a cybersecurity risk. One of the most notorious mobile phone attacks, next to phishing by SMS, is SIM swapping.
(more…)
May 5th is Liberation Day in my country (the Netherlands). Although the Allies did not fully liberate The Netherlands in August 1945. Soon after the war, the Dutch government decided that Liberation Day would take place on May 5th, the date of the German army’s defeat. This year, May 5th was on Thursday and the first Thursday of May is also known as World Password Day.
(more…)
In the first part of setting up KeePass, I showed how to set up a password database in KeePass and how to integrate this into a cloud storage system. I used Dropbox but you can also use other cloud storage solutions like Google Drive or OneDrive.
(more…)
I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up
(more…)
When I open my Google Chrome browser, I know there are certain risks involved when I enter “Battlefield Internet”. But like a lot of people out there, I have a busy job and when I get home I’m tired and I don’t want to bother about things that don’t immediately impact my general life. This type of unawareness is exactly what web specialized companies (legal) and cyber criminals (illegal) take advantage of with only one goal: financial benefits.
(more…)