Video: A Card Skimmer Was Installed in 3 Seconds
Apr18

Video: A Card Skimmer Was Installed in 3 Seconds

Not so long ago we wrote about tricks the fraudsters use for credit card frauds or identity thefts (and then, of course, for stealing money). But it is one thing to read, and quite another – to see. Thanks to the video record, recently put on the Internet by the Miami police, we can estimate the high “professionalism” of the crooks installing a card skimmer on the POS terminal. The video was recorded in a store at...

Read More
Was the NASA Hack Real and What It Has Taught Us
Apr13

Was the NASA Hack Real and What It Has Taught Us

Like everyone, hackers are looking for their moment of glory. Perhaps, this explains their constant interest in the well-known and big names: CIA, Pentagon, White House… And not so long ago the NASA’s turn has come. Apparently, not for the first time. The group of hackers AnonSec, which includes representatives of different countries, states that the hack occurred as far back as spring 2015. But they’ve managed to get this...

Read More
The Evolution of Two-Step Authentication
Apr04

The Evolution of Two-Step Authentication

With the advent of computer technologies in everyday life, the protection of data transmitted and stored in the network has become a necessity. Along with the hardware and software components, the data protection systems must include authentication tools that can prevent unauthorized access to the accounts. At first, the usual reusable passwords seemed a quite sufficient protection means. But, it soon became clear that this way of...

Read More
Two-Factor Authentication in Cloud Security
Mar21

Two-Factor Authentication in Cloud Security

Today, cloud services are incredibly popular both among users who store their personal data there and among the companies that use cloud services for a successful business. We shouldn’t underestimate the importance of the cloud, as a means to store the employees’ personal data and the necessary corporate information, which is available to an employee at any time and at any place. But we shouldn’t forget about cloud security...

Read More
Ransomware Virus Paralyzed the Hospital Work Once Again on Healthcare Information Security
Mar16

Ransomware Virus Paralyzed the Hospital Work Once Again on Healthcare Information Security

The more computer technologies pervade all areas of human life, the more important the user data protection becomes. Earlier the hackers could only steal your e-mail address to send the spam messages from it. But today the World Wide Web stores much more comprehensive information about all us. You even don’t need to share this information on the Internet for hackers to get it. It is enough to open a bank account, or seek medical...

Read More