10 Steps to Eliminate Digital Security Risks in Fintech Project
Oct25

10 Steps to Eliminate Digital Security Risks in Fintech Project

Any kind of project can be of potential interest to attackers, since the information stolen in an attack can be turned into cash. In the case of financial projects, though, an attack usually results in attackers transferring user or system funds to an unknown location. This eliminates the extra steps it would otherwise take them to reach their ultimate goal. Regardless of what stage your fintech project is at, it’s never a bad...

Read More
Top 7 Tips How to Protect Yourself from Phishing Scams
Oct04

Top 7 Tips How to Protect Yourself from Phishing Scams

What phishing is has been well-known for some time now. The first phishing attacks were noted shortly after the World Wide Web appeared. But despite the efforts of IT security specialists to create more effective ways of anti phishing protection, new phishing sites continue to appear every day. According to the data from several studies, there were about 5000 new phishing sites created every day in 2016. In 2017, this figure will be...

Read More
How to Program Protectimus Slim NFC Token
Oct01

How to Program Protectimus Slim NFC Token

If you have an NFC-enabled smartphone running Android, download and run the Protectimus TOTP Burner app. Initiate the software token setup on the system where you require enhanced security. Program Protectimus Slim NFC OTP token: Run the Protectimus TOTP Burner application. Tap the button “Burn the seed”. Tap “Scan the QR code” and scan the QR with the secret key you see on your account. You can also input the...

Read More