Protectimus Cuts the Prices
May26

Protectimus Cuts the Prices

Two-factor authentication is an indispensable element of modern information security system. Today, every resource, which stores confidential user data, is obliged to provide reliable data protection. It is dangerous and unprofitable to “recreate the wheel”. Developing a 2-step verification system on its own, the company assumes full responsibility for data protection. Very often such solutions have vulnerabilities that would later...

Read More
10 Things You Can Do with the Smartwatch
May20

10 Things You Can Do with the Smartwatch

How often do you have to worry about your cell phone running out of battery when you have a whole heap of things to do today? Have you ever forgotten your phone at home while hurrying to work in the morning? And how did you feel this day? Waiting for an important call, you have to carry your cell phone everywhere (even to the toilet)? And what it is like when you are in a crowded transport and your phone starts ringing being in the...

Read More
Panama Papers Leak – Evil or Good?
May18

Panama Papers Leak – Evil or Good?

Information bomb, known as the “Panama Papers Leak,” was planted a year ago, although it was detonated April 3, 2016, when the Panama documents were put on the Internet. It all started in 2015 when an unknown person proposed the journalists of the German newspaper Süddeutsche Zeitung the official documents of the Panamanian law firm Mossack Fonseca. The source didn’t ask for money, but only for preserving his anonymity....

Read More
Dutch Scientists: SMS Verification Is Vulnerable
May16

Dutch Scientists: SMS Verification Is Vulnerable

Computer security experts in their confrontation with the hackers are always trying to work ahead of the curve: to model and foresee probable “loopholes” in the data protection systems of different services and operating systems. In recent years, special attention has been paid to the mobile operating systems as more and more people use smartphones to enter their accounts or use them as 2-step verification means. Most...

Read More