Hackers - who are we defending ourselves against?
Hacking and hackers are shrouded in many myths. Who's a white hat, who's a black hat and how to pick a lock. As long as it's subtle.
Continue reading
Hacking and hackers are shrouded in many myths. Who's a white hat, who's a black hat and how to pick a lock. As long as it's subtle.
Continue reading
Série videí o soukromí a bezpečnosti v digitálním prostoru. Video sérii naleznete na tomto Otevřít sérii na Odysee Jednotlivé díly: Sodomák I Digitální Sebeobrana: Password123! Sodomák I Digitální Sebeobrana: Obrněný …
Continue readingÚtočníci našli slabinu v Chrome, mohou ji využít k phishingu
Continue reading
According to their creators, Troy was impregnable, Titanic was unsinkable, and Pandora’s car alarm was unhackable. However, someone (or something) appears to be brave enough to accomplish the impossible. The …
Continue reading
TODO: inline styles removed — review layout. Plain (email) Client to Server (Facebook Messenger, Gmail) End to end (Signal, Threema, Wire) You Hello there! Send Key: Transfer to server (internet): Hacker Server: …
Continue reading
TODO: interactive script from WordPress — needs manual Hugo shortcode or embed. You can check if your login credentials (and other data) were breached. Submit your username or email address you are using for …
Continue reading