Dr. Matteo Große-Kampmann

What does a hacker do?

What does a hacker do and what is hacking actually? There are no fixed definitions, but Wikipedia defines “hacking” as a measure to manipulate or completely break security mechanisms of a system. With this approach unforeseen ways of manipulating or attacking a system can be found.

continue reading

Office 365 Security Basics

Office 365 is not only the next version of the “Office Package”, but it bundles different applications and services from Microsoft to represent a digitalized office. Central business functions are Microsoft Teams, SharePoint and Exchange. Teams is a chat program, SharePoint is used to manage knowledge within a company and … continue reading

Emerging Home Office Risks

Home office is becoming more and more popular due to current events revolving around COVID-19. Around the world, companies and governments are rapidly taking responsible measures to protect the health of their employees and citizens while remaining operational – including encouraging people to work from home.

In the digital world, it’s not enough to simply sit at your computer at home to start work – what do you, as a user or a responsible person, need to do to secure your business in the digital space?

continue reading

Infodemic, Coronavirus and Fake News

Criminals are opportunistic. It’s not for nothing that the saying “opportunity breeds thieves”. The past has already shown that widely scattered news and crisis situations lead to criminals taking advantage of them, for example in the Australian bush fires at the beginning of the year. Because the corona virus activates … continue reading

EternalDarkness: Critical vulnerability in Windows 10

A critical vulnerability (CVE-2020-0796) called “EternalDarkness” in the SMB protocol was reported yesterday in Windows systems, specifically Windows 10 and Windows Server. The vulnerability can be prevented on servers with a workaround, but not on private machines. In any case, Microsoft recommends updating systems as soon as updates are available … continue reading

Hacking Tools presented for pentesters

As a pentester you need a broad arsenal of hacking tools. These are just as important as a sharp mind and stubbornness. As a pentester, you use hacking tools to uncover vulnerabilities in a system and report them to the company being tested. Which are considered hacking tools? With hacking … continue reading