What We Know About Cybersecurity In 2024
The cybersecurity landscape has become increasingly dangerous and challenging to navigate over the last number of years. Cybercrime has become a national and global threat to governments, corporations, as well as private individuals. Attacks are more frequent, and the potential consequences — including the loss of sensitive data, identity theft, business disruption and damage, and erosion of customer trust – are increasing...
Tesla App Two-Factor Authentication Coming Soon According to Elon Musk
Without a doubt, Tesla’s electric cars are the best vehicles on the market right now. They attract people with modern design, high efficiency, and the low cost of maintenance and operation. These vehicles are generally considered pretty theft-proof, thanks to always-on GPS which lets owners track their cars. But numerous smart features still make these cars extremely vulnerable to hacking. That’s how the two-factor...
Remote Work: How to Transition Team to Working From Home During the COVID-19 Pandemic
In this article, we’ve gathered everything you need to know about remote work. We share our own experiences and talk about how to organize remote access to company resources, how to protect the accounts of users who are working from home, what remote team working tools you can use for communicating and managing tasks, and how to keep in touch with your remote teams. Working remotely during the pandemic is not a mere trend....
How to Get Protected from RFID Credit Card Fraud
Remote stealing of money from bank cards embedded with RFID chips, which is also called an RFID credit card fraud, is quite common for all countries where people use RFID cards, especially for the US and Europe. Let’s try to figure out how this happens and what should you do to protect yourself from such attacks. The RFID technology simplifies the process of cashless payments and is used by international payment systems...
Time Drift in TOTP Hardware Tokens Explained and Solved
Multi-factor authentication by a Time based One Time Password (TOTP) generated with a physical device is, without any doubt, the staunchest approach to safeguarding sensitive data and securing access to your invaluable accounts. But being physical objects and having no internet connection gives physical TOTP tokens both their main strength and their major drawback. Without any connection to the net, the tokens’ internal clocks...
Reddit was hacked: how it happened, who the victims were, and why SMS authentication failed
Reddit was hacked. The attackers managed to extract logins, e-mail addresses, passwords (salted and hashed, fortunately), and even a complete list of private messages from users who joined the site before 2007. The hackers were also able to access the e-mail addresses and logins of all users who received the site’s newsletter in June 2018. The SMS authentication failed. The attackers were able to intercept SMS messages...