IT-Security Blog

Lesen Sie über 500 kostenfreie Beiträge rund um Hacking, Malware und Betrugsmaschen im Internet.

CTF: Learning Format for Cybersecurity

A Capture the Flag (CTF) contest is an event that is well known in the field of information security. Regardless of whether they are experts or newcomers, a CTF can help build information security capabilities. The competitive character makes the whole thing competitive.

Weiterlesen

Election evaluation software with big security problems!

Shortly before the election in the USA, security problems of an election analysis software in Switzerland become public. Several cantons are using outdated and vulnerable software and make it clear that IT security has not been a major issue in recent years. Together with the Swiss online magazine Republik, IT security experts took a closer look at the software used.

Weiterlesen

Duckduckgo directions are now available!

The Internet search engine Duckduckgo has now integrated directions. The possibility to access a map and directions directly via different search engines, such as Google, is already known. But now the search engine Duckduckgo can also shine with this feature.

Weiterlesen

Pentest Tool #5 – Naabu

In week 5 we will introduce the Pentest Tool #5 Naabu. Naabu is a scanner like the tools we already know. We are still in the reconnaissance phase, in which we as attackers try to get to know the target system as well as possible. Using Naabu, the goal is to detect open ports on the target system with a very fast scan.

Weiterlesen