How to Protect Yourself From Email Hacking
Aug30

How to Protect Yourself From Email Hacking

We have almost stopped writing paper letters, those on crispy brand-new sheets. The lion’s share of the correspondence is now sent via emails. And often it is not even personal correspondence. For personal purposes, we have different messengers and can have an interactive dialogue. Usually, emails are used for sending business letters, which contain sensitive information. Thus, the email data protection is extremely important...

Read More
How to Secure Bitcoin Wallet
Aug30

How to Secure Bitcoin Wallet

A couple of years ago Bitcoin made quite a stir all across the mainstream media when the price skyrocketed. People that never even heard about blockchain, cryptocurrencies or Bitcoin wallet suddenly started looking into buying some. That’s when more and more horror stories from people that lost all their assets due to a lost password or stolen keys started to appear in common press, like the Guardian. Though we’ve all been...

Read More
Keylogger Definition, Detection, and Protection
Aug06

Keylogger Definition, Detection, and Protection

There are hundreds, if not thousands, types of malware spread online. Out of them all, keyloggers can legitimately be considered the worst. We are not being dramatic here. If you get infected with a keylogger virus you basically show the hackers everything typed on the keyboard. Passwords, credit card credentials, messages, everything you search for, all of it gets to be exposed and easily stolen. Read on to learn: the keystroke...

Read More
How Does Brute Force Attack Work
Jul29

How Does Brute Force Attack Work

Brute force attack is one of the oldest hacking methods, yet still one of the most popular and most successful ones. With computers and technologies evolving as fast as they are, bruteforce attacking is now fairly easy to run and more difficult to protect against. Brute force attack definition So, what is brute force exactly? Brute force definition can be given as such — it is a type of cryptanalytic attack that uses a simple trial...

Read More
SMS Authentication: All Pros and Cons Explained
Jul18

SMS Authentication: All Pros and Cons Explained

It’s delightful to see that more and more websites, apps and services employ MFA and even make this type of log-in protection a mandatory feature. What makes us a bit concerned, is that a huge portion of those websites still opt for SMS 2fa. Despite the facts that SMS verification has too many limitations and has been proven to be a lot less secure as any other two-factor authentication method. In fact, NIST (the National Institute of...

Read More
Time Drift in TOTP Hardware Tokens Explained and Solved
Jun03

Time Drift in TOTP Hardware Tokens Explained and Solved

Multi-factor authentication by a Time based One Time Password (TOTP) generated with a physical device is, without any doubt, the staunchest approach to safeguarding sensitive data and securing access to your invaluable accounts. But being physical objects and having no internet connection gives physical TOTP tokens both their main strength and their major drawback. Without any connection to the net, the tokens’ internal clocks...

Read More