The digging of crypto currencies can lead to a constant income – in cryptojacking external computing power is used. The more computing power, the more money is earned. However, this type of attack loses interest. That the procedure is established as an alternative to normal advertising is also less likely. [Read more…] about Coinhive ceases operations – is it the end for Cryptojacking?
The CERT has issued a warning via Twitter that dozens of Lookalike domains are currently in circulation that pretend to belong to popular OpenSource software. Let’s take a closer look at what Lookalike domains are and how to avoid them. [Read more…] about Lookalike domains discovered for Open Source projects!
They exist – the situations in which large files have to be transferred. In the office you can still help yourself with USB sticks. From a distance you can now use another service: Firefox Send!
The Open Source Browser service can be used by any browser. The service should encrypt the uploaded data end-to-end and offers manageable, but useful, additional functions. [Read more…] about Firefox Send – Transfer Big Data!
Football clubs are often used as passwords. How often exactly? We took a closer look at this! You can register quickly on platforms, websites or in apps – if it weren’t for the annoying password. But how do you remember all the passwords?
Obviously, many people use their football clubs to assign passwords. These are, at least in part, surprisingly often used as passwords. How often exactly? You can find that out from our count! [Read more…] about This football club is most often used as a password!
The Cybärcast moves and is renamed to the sevencast! Behind it is a bigger change. And this short episode is dedicated exactly to this topic. The Live Hacking & Awareness range moves out from the Institut for Internet security and profenssionalize the offer as own Company. [Read more…] about Episode 18 – The cybercast officially becomes the sevencast!