Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down
Oct16

Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down

What seems perfectly thought out and reliable, often presents us with the most unexpected surprises. Such a sad discovery befell the creators of the car Jeep Cherokee model 2014 in July 2015, when the Internet stirred up the news about two professional hackers Chris Valasek and Charlie Miller who managed to gain remote access to the onboard computer of the seemingly “perfect” car and take the operation of its core systems under their...

Read More
Virus CoreBot Turned into a Dangerous Banking Trojan
Oct15

Virus CoreBot Turned into a Dangerous Banking Trojan

In late August, a new Trojan Virus CoreBot was discovered by IBM specialists. At first, it did not look particularly dangerous: its possibilities were limited to stealing local passwords and personal data of users in different browser and desktop applications. However, experts were seriously concerned about the modular structure of the new threat that promised great potential for its development. And they were right. In the first ten...

Read More
The Most Popular Passwords of Ashley Madison Users – Overused, Predictable and Unreliable
Oct13

The Most Popular Passwords of Ashley Madison Users – Overused, Predictable and Unreliable

Ashley Madison is a popular Canadian resource for users who do not mind to leave the line of a faithful husband and have some fun on the side. The basis for the creation of Ashley Madison was the idea of a dating site for the purpose of adultery, which is evident from the motto on its main page «Life is short. Have an affair ». August 19, 2015 was a “fateful day” for many users of the site, as well as for their spouses, as a group of...

Read More
Two-Factor Authentication in the PCI DSS Standard
Oct12

Two-Factor Authentication in the PCI DSS Standard

The use of payment cards for the modern man has long been commonplace. But we do not always think about how extensive and complex is the work that was done by the companies which provide such services, how many diverse requirements they complied in order to give us the possibility simply to insert the card into the slot of the ATM and get our money or book the room in the internet before the vacation trip. Meanwhile, getting the right...

Read More