Even if at least they know it, SSL and especially TLS are the protocols we use most often on the Internet. SSL and its successor TLS are protocols which are used to encrypt our surfing on the Internet. They are also the ones that turn the “http” in our address bar into “https“. In the following we want to talk about the basics of SSL and TLS. [Read more…] about The History of SSL/TLS: Part 1 – Basics of SSL and TLS
One data leak on Facebook follows the next – it won’t be quiet around the social network group. Now 419 million phone numbers of accounts have been published. The unencrypted data is linked to the Facebook ID and can thus be clearly assigned. [Read more…] about Data leak on Facebook: 419 million public phone numbers!
The digging of crypto currencies can lead to a constant income – in cryptojacking external computing power is used. The more computing power, the more money is earned. However, this type of attack loses interest. That the procedure is established as an alternative to normal advertising is also less likely. [Read more…] about Coinhive ceases operations – is it the end for Cryptojacking?
The CERT has issued a warning via Twitter that dozens of Lookalike domains are currently in circulation that pretend to belong to popular OpenSource software. Let’s take a closer look at what Lookalike domains are and how to avoid them. [Read more…] about Lookalike domains discovered for Open Source projects!
They exist – the situations in which large files have to be transferred. In the office you can still help yourself with USB sticks. From a distance you can now use another service: Firefox Send!
The Open Source Browser service can be used by any browser. The service should encrypt the uploaded data end-to-end and offers manageable, but useful, additional functions. [Read more…] about Firefox Send – Transfer Big Data!