M.Sc. Jan Hörnemann

GPT-3 – Does a blog article flood follow from the AI?

Artificial intelligence is one of the most discussed topics in IT. AI also plays a major role in IT security, for example when it comes to malware detection. An American student has shown that with the GPT-3 AI technology a blog article can be written automatically, which can hardly be distinguished from a human written article.

continue reading

Create Twitter lists – this is how it works!

Twitter is a social platform where users can write and publish short messages. Many celebrities have their own Twitter accounts and share current information about this account. To keep an overview of the accounts that you follow yourself, there are lists. We explain how to create such Twitter lists and which setting options are available.

continue reading

What is social hacking?

There are various types of hacking, sometimes a ransom is extorted if the attackers have managed to encrypt the database (ransomware), but in some types of hacking humans play a major role. The same is true for social hacking, where the weak point is not a misconfiguration of a system but the human being himself.

continue reading

PIN or password? – How to protect your Smartphone from attacks!

The password is the number one means of authentication, it protects our devices from unauthorized access, but also digital accounts such as the e-mail account are protected by their own password. The password comes in various forms, but the most common are a real password or a 4-digit PIN. We have taken a closer look at these two methods to determine whether the 4-digit code offers enough security.

continue reading