M.Sc. Chris Wojzechowski

Browser-in-a-Browser Attacke

Browser-in-a-Browser attack: We explain it

Have you ever heard of a so-called browser-in-a-browser attack? This is a resourceful phishing method that hackers increasingly use to try to get hold of your passwords and thus gain access to the corresponding IT systems. But what sounds quite simple at first, then requires a bit more explanation for … continue reading

Crypto Mining

What is crypto mining and how safe is it?

It all started with Bitcoin, or rather its whitepaper, which first revealed the idea of a digital currency. A currency that would not be controlled by states or governments and would be decentralized, so that any outside intervention seemed almost impossible. This is Satoshi Nakamoto’s Bitcoin, which is now known … continue reading

Fake-Accounts auf LinkedIn

Fake accounts on LinkedIn – A problem?

Social networks determine our everyday life, for companies LinkedIn is often an important network for maintaining contacts. But due to fake accounts on LinkedIn, major hacks and security problems rise. Why LinkedIn? Fake accounts on Instagram or Facebook are common. For attackers, however, LinkedIn is a valuable platform because it … continue reading

Pentest as a service - aware7

What is Pentest as a Service?

Pentest as a Service can be relevant for anyone who is continuously striving to have their infrastructure and applications examined for IT security. Progressive digitization brings with it many advantages. Companies can work faster and more flexibly, as well as react more flexibly to changes. But digital networking and the … continue reading