Protectimus Report at the OWASP KNURE Conf
Last Saturday Denis Shokotko, the Chief Innovation and R&D Officer at Protectimus, became one of the speakers at the second conference on WEB-security OWASP KNURE Students Chapter. Denis told about the main mechanisms of protection of web-applications and modern trends in two-factor authentication. His presentation touched on the smart identification and data signature functions. The listeners learned about the new generation of...
Video: A Card Skimmer Was Installed in 3 Seconds
Not so long ago we wrote about tricks the fraudsters use for credit card frauds or identity thefts (and then, of course, for stealing money). But it is one thing to read, and quite another – to see. Thanks to the video record, recently put on the Internet by the Miami police, we can estimate the high “professionalism” of the crooks installing a card skimmer on the POS terminal. The video was recorded in a store at...
Was the NASA Hack Real and What It Has Taught Us
Like everyone, hackers are looking for their moment of glory. Perhaps, this explains their constant interest in the well-known and big names: CIA, Pentagon, White House… And not so long ago the NASA’s turn has come. Apparently, not for the first time. The group of hackers AnonSec, which includes representatives of different countries, states that the hack occurred as far back as spring 2015. But they’ve managed to get this...
The Evolution of Two-Step Authentication
With the advent of computer technologies in everyday life, the protection of data transmitted and stored in the network has become a necessity. Along with the hardware and software components, the data protection systems must include authentication tools that can prevent unauthorized access to the accounts. At first, the usual reusable passwords seemed a quite sufficient protection means. But, it soon became clear that this way of...
Two-Factor Authentication in Cloud Security
Today, cloud services are incredibly popular both among users who store their personal data there and among the companies that use cloud services for a successful business. We shouldn’t underestimate the importance of the cloud, as a means to store the employees’ personal data and the necessary corporate information, which is available to an employee at any time and at any place. But we shouldn’t forget about cloud security...