8 Ways to Hack Email
Nov30

8 Ways to Hack Email

We have almost stopped writing paper letters, those on crispy brand-new sheets. The lion’s share of the correspondence is now sent via Emails. And often it is not even personal correspondence. For personal purposes, we have different messengers and can have an interactive dialogue. Usually, Emails are used for sending business letters, which contain sensitive information. Thus, the Email data protection is extremely important....

Read More
9 Data Protection Tips for Safe Online Shopping
Nov27

9 Data Protection Tips for Safe Online Shopping

Annual sales season is in full swing! Black Friday, Cyber Monday and Christmas Sales cause an unprecedented stock-jobbing. Everyone wants to make his or her best bargain in 2015. Besides, today there is no need in exhausting shopping in malls and emporiums. We can order everything from home with the help of the computer or smartphone. But, in anticipation of the holidays and bargains we should not forget about the importance of data...

Read More
Identification, authentication, and authorization – what’s the difference
Nov26

Identification, authentication, and authorization – what’s the difference

Identification, authentication, and authorization. We all face these three concepts every day, but not everyone knows the difference. Since these terms are essential in data protection, they deserve to be explained better. To begin, let’s take an example from everyday life. It will help you to understand the difference between authentication and identification in general. A new employee comes to work for the first time. At the...

Read More
Password Manager KeePass Is Vulnerable
Nov23

Password Manager KeePass Is Vulnerable

It is not news that a fair amount of threats waits for the user in the vast global network. And it is clear that the best way out is to keep valuable information in encrypted form and protect it with a strong password. But the fact that it is possible to “pull” out in a form of a simple text file all the data from the password manager – the program which encrypts and generates passwords – became a surprise for...

Read More
Cybersecurity Lesson from T-Mobile and Experian
Nov20

Cybersecurity Lesson from T-Mobile and Experian

Recently, the whole world and especially the U.S. citizens have been stirred up by the news about the leakage of credit history data of 15 million subscribers of the international mobile operator T-Mobile. What is notable in this story is that the information was not stolen directly from T-Mobile’s database but from the servers of its partner – Experian. Considering this example in details gives a valuable cybersecurity...

Read More