The Messenger Signal, otherwise praised by many sides, has caused a lot of discussion due to a PIN function introduced in May. Especially the fact that this function is not optional, but has to be used, caused criticism from some users.
M.Sc. Jan Hörnemann
GlueBall security gap was only closed after 2 years!
A security hole that has been known since 2018 has now been closed. This vulnerability was called GlueBall by the two discoverers and was given the rating “Important” by Microsoft after it was ignored for 2 years.
GPT-3 – Does a blog article flood follow from the AI?
Artificial intelligence is one of the most discussed topics in IT. AI also plays a major role in IT security, for example when it comes to malware detection. An American student has shown that with the GPT-3 AI technology a blog article can be written automatically, which can hardly be distinguished from a human written article.
Firefox Tips – These 7 tips make browsers safer and protect your privacy!
Mozilla Firefox is one of the most popular browsers. In order to protect your privacy and to be able to surf safely with Firefox you should know some tips. We have summarized the most important 7 tips for you.
Create Twitter lists – this is how it works!
Twitter is a social platform where users can write and publish short messages. Many celebrities have their own Twitter accounts and share current information about this account. To keep an overview of the accounts that you follow yourself, there are lists. We explain how to create such Twitter lists and which setting options are available.
What is social hacking?
There are various types of hacking, sometimes a ransom is extorted if the attackers have managed to encrypt the database (ransomware), but in some types of hacking humans play a major role. The same is true for social hacking, where the weak point is not a misconfiguration of a system but the human being himself.
7 golden rules for group chat in WhatsApp
Almost everyone knows large and confusing groups in the popular Messenger WhatsApp. To ensure that all group members can be included and the group discussion does not end in chaos, we have summarized the rules for group chat in WhatsApp.
PIN or password? – How to protect your Smartphone from attacks!
The password is the number one means of authentication, it protects our devices from unauthorized access, but also digital accounts such as the e-mail account are protected by their own password. The password comes in various forms, but the most common are a real password or a 4-digit PIN. We have taken a closer look at these two methods to determine whether the 4-digit code offers enough security.
Serious programs spread malware – The supply chain attack
Distributing malware to many devices is very difficult for criminals. Manipulated apps are blocked by the App Stores and malicious programs are intercepted by the antivirus program. That’s why attackers try to distribute malicious software by using serious programs, the so-called supply chain attack.
Fawkes – An OpenSource project tries to prevent unauthorized face recognition!
A research project by an American research group alters images to the extent that facial recognition is prevented. This development is mainly directed against a company that has carried out unauthorized facial recognition.