Do we need multi-factor authentication in social networks?
Jul15

Do we need multi-factor authentication in social networks?

No one tries to contradict that multi-factor authentication is very important for corporate and personal accounts – especially those relating to financial assets turnover. But for many users, strong authentication in social networks seems an excessive caution. Usually, people use social networks for entertainment, socializing with friends, and following the news. The majority of social networks profiles have no relation to money...

Read More
Protectimus Cuts the Prices
May26

Protectimus Cuts the Prices

Two-factor authentication is an indispensable element of modern information security system. Today, every resource, which stores confidential user data, is obliged to provide reliable data protection. It is dangerous and unprofitable to “recreate the wheel”. Developing a 2-step verification system on its own, the company assumes full responsibility for data protection. Very often such solutions have vulnerabilities that would later...

Read More
Dutch Scientists: SMS Verification Is Vulnerable
May16

Dutch Scientists: SMS Verification Is Vulnerable

Computer security experts in their confrontation with the hackers are always trying to work ahead of the curve: to model and foresee probable “loopholes” in the data protection systems of different services and operating systems. In recent years, special attention has been paid to the mobile operating systems as more and more people use smartphones to enter their accounts or use them as 2-step verification means. Most...

Read More
A Wrong Lesson on Information Security
Apr26

A Wrong Lesson on Information Security

Recently, the CNBC news website gave a quite controversial lesson on information security. The author of the article, indirectly related to the information security issue (it said about the confrontation between Apple and the FBI), decided to add a text box for the passwords strength check. Most likely, this form was included as a “salt” to attract more attention. The author of the publication didn’t aim to improve...

Read More
Protectimus Team at IT Spring Forum
Apr25

Protectimus Team at IT Spring Forum

Last week was very active for the Protectimus team. In addition to the participation in OWASP KNURE conference, we attended another event – IT Spring Forum held in Dnipropetrovsk. The participants of the IT Spring Forum discussed international trends in the development of the software industry, the Internet of things (IoT), the development of IT-solutions for the healthcare institutions, and modern tools for users’ data...

Read More