Sascha KörnerCompter Based Social EngineeringIn the realm of **cybersecurity**, there are various tactics employed by attackers to deceive and exploit individuals. One such tactic…Jun 27Jun 27
Sascha KörnerWas ist Social EngineeringMenschen zur Preisgabe von vertraulichen Informationen bringen.Aug 5, 2023Aug 5, 2023
Sascha KörnerSniplets from my Ethical Hacking Journey — Asymmetric encryptionWith symmetric encryption we can assume that confidential data is well protected, provided we use a secure algorithm with an acceptable…Apr 20, 2023Apr 20, 2023
Sascha KörnerPhases of a hacking attackThe hacker must be creative and flexible but usually follows a plan with different phases.Apr 7, 2023Apr 7, 2023
Sascha KörnerIT Security Attack VectorsIT security is more important than ever as more aspects of our daily lives depend on the digital world. There are a variety of attack…Apr 4, 2023Apr 4, 2023
Sascha KörnerThe most important attack vectors in IT security: an overviewIT security is a critical aspect in today’s digital world, with a variety of attack vectors threatening both businesses and individuals…Apr 4, 2023Apr 4, 2023
Sascha KörnerDie wichtigsten Angriffsvektoren in der IT-Sicherheit: Eine ÜbersichtDie IT-Sicherheit ist ein kritischer Aspekt in der heutigen digitalen Welt, da eine Vielzahl von Angriffsvektoren sowohl Unternehmen als…Apr 4, 2023Apr 4, 2023