A journalist of the renowned Wired magazine was hacked and all his data was deleted in a matter of minutes. And yet he used very strong passwords. How is this possible and how can you prevent this
from happening to you?
Published 17.10.2012
If you’re an intensive Google user, you will know that a single username and password give access to all Google services. Since this constitutes a potential security threat, it’s best to secure your
account in two “layers”. How?
Published 06.01.2012
Professionals and companies are increasingly storing their files and other data in the cloud, for instance via Dropbox. If you don’t fully trust the security of this cloud service, how can you give
your data extra protection?
Published 21.09.2015
Almost all major online services now optionally offer a “2-step account verification”, which means that a password alone is no longer enough for logging in. How exactly does this work on your
computer, smartphone or tablet?
Published 13.10.2016
If you want to use a Microsoft product or service, you’re required to have an online Windows account in most cases. How do you best protect this crucial account?
Published 28.02.2014
If you want to use a web service or cloud tool these days, you will generally be asked to log in with a username and password. How do make this procedure as safe as possible?
Published 03.09.2018
The rule is simple: always use complex passwords and use a different one on every site that requires you to register. But how do you store all these passwords safely? A password manager offers the
solution. Which should you choose?
Published 17.10.2012
You are aware that it’s best to use a unique and strong password on every website which requires a login. This is easier said than done: What is the best way to create and remember these passwords?
Is a password manager the solution?
Published 19.10.2015
The Heartbleed attack has shown that everyone runs the risk of losing their password. What are signals to look out for that someone may have hacked your password?
Published 12.06.2014
The following situation may sound familiar: you suddenly start receiving strange messages from a Twitter follower or, worse, your own Twitter account starts acting oddly. What can you do if one of
your social network accounts is hacked?
Published 19.12.2013