What We Know About Cybersecurity In 2024
Jan19

What We Know About Cybersecurity In 2024

The cybersecurity landscape has become increasingly dangerous and challenging to navigate over the last number of years. Cybercrime has become a national and global threat to governments, corporations, as well as private individuals. Attacks are more frequent, and the potential consequences — including the loss of sensitive data, identity theft, business disruption and damage, and erosion of customer trust – are increasing...

Read More
Tesla App Two-Factor Authentication Coming Soon According to Elon Musk
Sep03

Tesla App Two-Factor Authentication Coming Soon According to Elon Musk

Without a doubt, Tesla’s electric cars are the best vehicles on the market right now. They attract people with modern design, high efficiency, and the low cost of maintenance and operation. These vehicles are generally considered pretty theft-proof, thanks to always-on GPS which lets owners track their cars. But numerous smart features still make these cars extremely vulnerable to hacking. That’s how the two-factor...

Read More
Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic
Apr27

Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic

In this article, we’ve gathered everything you need to know about remote work. We share our own experiences and talk about how to organize remote access to company resources, how to protect the accounts of users who are working from home, what remote team working tools you can use for communicating and managing tasks, and how to keep in touch with your remote teams. Working remotely during the pandemic is not a mere trend....

Read More
How to Get Protected from RFID Credit Card Fraud
Jul08

How to Get Protected from RFID Credit Card Fraud

Remote stealing of money from bank cards embedded with RFID chips, which is also called an RFID credit card fraud, is quite common for all countries where people use RFID cards, especially for the US and Europe.  Let’s try to figure out how this happens and what should you do to protect yourself from such attacks. The RFID technology simplifies the process of cashless payments and is used by international payment systems...

Read More
Time Drift in TOTP Hardware Tokens Explained and Solved
Jun03

Time Drift in TOTP Hardware Tokens Explained and Solved

Multi-factor authentication by a Time based One Time Password (TOTP) generated with a physical device is, without any doubt, the staunchest approach to safeguarding sensitive data and securing access to your invaluable accounts. But being physical objects and having no internet connection gives physical TOTP tokens both their main strength and their major drawback. Without any connection to the net, the tokens’ internal clocks...

Read More
Reddit was hacked: how it happened, who the victims were, and why SMS authentication failed
Aug16

Reddit was hacked: how it happened, who the victims were, and why SMS authentication failed

Reddit was hacked. The attackers managed to extract logins, e-mail addresses, passwords (salted and hashed, fortunately), and even a complete list of private messages from users who joined the site before 2007. The hackers were also able to access the e-mail addresses and logins of all users who received the site’s newsletter in June 2018. The SMS authentication failed. The attackers were able to intercept SMS messages...

Read More