Security summary – March 2019

Security summary – March 2019

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Security summary – February 2019

Security summary – February 2019

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Security summary – January 2019

Security summary – January 2019

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Privacy: the deceptive anonymity of Bitcoin and Co

Privacy: the deceptive anonymity of Bitcoin and Co

Just because “kryptós“ is ancient Greek for secret does not mean that cryptocurrencies guarantee privacy. But, several concepts promise relief.

Read more
Happy Data Privacy Day 2019

Happy Data Privacy Day 2019

Today is Data Privacy Day – a full day dedicated to raise awareness of digital security and privacy protection online.

Read more
Security summary – December 2018

Security summary – December 2018

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Security summary – November 2018

Security summary – November 2018

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Security summary – October 2018

Security summary – October 2018

Our short monthly review summarises important news and blog posts, which focus on IT security, cloud computing and privacy protection.

Read more
Password autofill for iOS 12

Password autofill for iOS 12

There’s a new version of the SecureSafe app out and that means safer, simpler ways to manage your passwords. In particular, the password autofill feature has been greatly enhanced for iPhone users that have installed iOS 12 on their mobile.

Read more
Cyber war: The invisible opponent

Cyber war: The invisible opponent

It’s like the plot of a bad crime novel. A series of crimes occur and the police always come across the same suspect at the scene of the crime. He would definitely have a motive, but constantly asserts his innocence and no one can prove he did anything.

Read more