Cybersecurity Lesson from T-Mobile and Experian
Nov20

Cybersecurity Lesson from T-Mobile and Experian

Recently, the whole world and especially the U.S. citizens have been stirred up by the news about the leakage of credit history data of 15 million subscribers of the international mobile operator T-Mobile. What is notable in this story is that the information was not stolen directly from T-Mobile’s database but from the servers of its partner – Experian. Considering this example in details gives a valuable cybersecurity...

Read More
How to Make the Internet of Things Safe
Nov17

How to Make the Internet of Things Safe

In recent years, the Internet of Things has been developing rapidly. Today, not only computers and smartphones can access the network. Many kinds of home appliances, including refrigerators and washing machines, are also connected to the World Wide Web. The idea of such devices is certainly good: Internet connection allows you to manage them even at a considerable distance. It’s comfortable to use a smartphone on your way home to...

Read More
Two-Factor Authentication with Background Noise: Is It Safe or Not
Oct30

Two-Factor Authentication with Background Noise: Is It Safe or Not

The term two-factor authentication is known for the majority of active users of the Internet. It is available on a variety of well-established websites conducting the work with the data of users: in social networks, email services, online banking.  But unfortunately, not all the users use the benefits of this type of authentication. The most frequently this occurs because of some inconvenience with the standard 2FA procedure. The...

Read More
Microsoft Patents Hard-to-Mimic Gesture-Based Authentication
Oct21

Microsoft Patents Hard-to-Mimic Gesture-Based Authentication

It’s hard to imagine the modern rhythm of everyday life without gadgets, to which we are so accustomed. The first computer could perform only a limited number of functions. Its length was about 17 meters, the height of more than 2.5 meters, it weighed 4.5 tons and covered an area of several dozen square meters. Half a century later multifunctional gadgets became a thousand times smaller in size and instantly perform tasks that...

Read More
Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down
Oct16

Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down

What seems perfectly thought out and reliable, often presents us with the most unexpected surprises. Such a sad discovery befell the creators of the car Jeep Cherokee model 2014 in July 2015, when the Internet stirred up the news about two professional hackers Chris Valasek and Charlie Miller who managed to gain remote access to the onboard computer of the seemingly “perfect” car and take the operation of its core systems under their...

Read More
Virus CoreBot Turned into a Dangerous Banking Trojan
Oct15

Virus CoreBot Turned into a Dangerous Banking Trojan

In late August, a new Trojan Virus CoreBot was discovered by IBM specialists. At first, it did not look particularly dangerous: its possibilities were limited to stealing local passwords and personal data of users in different browser and desktop applications. However, experts were seriously concerned about the modular structure of the new threat that promised great potential for its development. And they were right. In the first ten...

Read More