M.Sc. Chris Wojzechowski


WordPress: Security vulnerabilities in corporate websites?

WordPress is considered the most widely used content management system in the world. It’s free, quick, and easy to learn, and while it still doesn’t meet many professional needs, it’s still the first and best choice for many businesses. Mainly because it presents the administration and creation in a way … continue reading

Browser-in-a-Browser Attacke

Browser-in-a-Browser attack: We explain it

Have you ever heard of a so-called browser-in-a-browser attack? This is a resourceful phishing method that hackers increasingly use to try to get hold of your passwords and thus gain access to the corresponding IT systems. But what sounds quite simple at first, then requires a bit more explanation for … continue reading

Phishing Tool

The 12 best tools for phishing simulations

Phishing simulations are an essential part of any IT security strategy. This is simply because phishing is still a major and serious problem that can compromise companies relatively easily and quickly. The phishing simulation provides you with security and sensitizes your own employees to this extremely important topic, because in … continue reading

Ransomware auf dem Mac

Ransomware on the Mac: How do I protect myself?

Ransomware on the Mac, is there such a thing? Mac users often feel particularly safe and do not expect that an attack could occur against them. This is partly because the system has been less of a target for hackers in the past. But that is changing more and more. … continue reading


Y2K38 – The new millennium bug?

At the turn of the year 1999/2000, there were dystopian predictions, from the failure of computer systems to the false starts of nuclear weapons systems. The reason for this was the bug known as the Millennium Bug or Y2K Bug – And in 2038, a related problem awaits us in … continue reading


DMARC – Purpose & Functionality Explained!

Email itself is quite old, and so are the protocols standardized for it. Between all these old protocols, DMARC, short for Domain-based Message Authentication, Reporting and Conformance, is practically still an infant. We explain the purpose behind this protocol and how it works in this article. The history of DMARC … continue reading


What is DKIM?

If you are looking for protection mechanisms for email on the Internet, you will quickly come across DKIM. This identification protocol is designed to counteract unwanted emails such as spam or phishing. But what is this protocol all about? How does it work and how can I use it myself … continue reading

digitale signatur

How do digital signatures work?

If you want to sign something in the analog world, you can simply take a pen and put your signature under the corresponding document. In the digital space, digital signatures exist for this purpose, but they can do much more than merely exist and be recognized as a legally valid … continue reading

Crypto Mining

What is crypto mining and how safe is it?

It all started with Bitcoin, or rather its whitepaper, which first revealed the idea of a digital currency. A currency that would not be controlled by states or governments and would be decentralized, so that any outside intervention seemed almost impossible. This is Satoshi Nakamoto’s Bitcoin, which is now known … continue reading


Packet loss on the Internet: What’s its source and meaning?

The Internet works a little differently than most people think. Especially on the technical side, there are things that need to be understood first in order to understand the big picture. Packet loss is one of those basics that, while often familiar in concept, is largely unknown in detail. To … continue reading