How to Set Up Two-Factor Authentication on Poloniex with Protectimus Slim NFC
Learn more about Protectimus Slim NFC token or order one here: Protectimus Slim NFC The best 2FA token to protect your Poloniex account! How to enable two-factor authentication with hardware OTP token Protectimus Slim NFC in Poloniex cryptocurrency exchange. Download the Protectimus TOTP Burner application. Login to your Poloniex account and initiate the enrolment of software token: Go to Settings and choose “Two-Factor...
The Petya Virus: How It All Went
27 June 2017 could be called Ukrainian history’s “black cyber Tuesday”. On that day, the NotPetya (Petya.A, ExPetr) attack began, affecting almost all sectors in the country: communications, energy, banking, media, and transportation. The Petya ransomware is far from the first test of the strength of Ukraine’s infrastructure. Such attacks have been attempted at least three times. The first two attacks...
The Risks and Perils of Pokemon GO
This summer it seems the world has gone crazy over Pokemon. The characters who first gained fame in the animated series from the early 2000s have returned triumphantly and are again earning millions – now in the form of the game Pokemon GO. Its popularity is such that even serious IT-themed internet publications are writing articles about the rules of the game and advice about how to download and install it in countries...
Protectimus’ 2FA Solution Compatible with Citrix NetScaler Gateway
The Protectimus Solutions LLP team is happy to announce that our two-factor authentication solution has been successfully integrated with Citrix NetScaler Gateway and that Protectimus has been certified as a Citrix Ready Partner. The Citrix Ready program exists to verify the compatibility of third-party software solutions with Citrix products. This allows users of Citrix to be confident in the reliability and compatibility of...
Do we need multi-factor authentication in social networks?
No one tries to contradict that multi-factor authentication is very important for corporate and personal accounts – especially those relating to financial assets turnover. But for many users, strong authentication in social networks seems an excessive caution. Usually, people use social networks for entertainment, socializing with friends, and following the news. The majority of social networks profiles have no relation to money...