How to Make a Profit out of Voice Call Based 2FA
Oct10

How to Make a Profit out of Voice Call Based 2FA

You thought all hackers are bad? It’s not so simple: in IT circles there has long been a distinction between “black hat” and “white hat” code crackers. The first are easily understood: they are using their skills to deprive users and companies of money, and also prey on other valuable information for the purposes of identity theft. But there are those who engage in hacking, not for gain, but with humanitarian and scientific motives....

Read More
Do we need multi-factor authentication in social networks?
Jul15

Do we need multi-factor authentication in social networks?

No one tries to contradict that multi-factor authentication is very important for corporate and personal accounts – especially those relating to financial assets turnover. But for many users, strong authentication in social networks seems an excessive caution. Usually, people use social networks for entertainment, socializing with friends, and following the news. The majority of social networks profiles have no relation to money...

Read More
Social Engineering Against 2FA: New Tricks
Jul04

Social Engineering Against 2FA: New Tricks

In the digital age, data protection is important for every Internet user since today people entrust network with too much information: passport data, electronic and physical addresses, payment cards information, and social security numbers. There are various authentication scenarios used to protect the user’s confidential information. And two-factor authentication has been recognized as one of the most reliable. All information...

Read More
Protectimus Cuts the Prices
May26

Protectimus Cuts the Prices

Two-factor authentication is an indispensable element of modern information security system. Today, every resource, which stores confidential user data, is obliged to provide reliable data protection. It is dangerous and unprofitable to “recreate the wheel”. Developing a 2-step verification system on its own, the company assumes full responsibility for data protection. Very often such solutions have vulnerabilities that would later...

Read More
10 Things You Can Do with the Smartwatch
May20

10 Things You Can Do with the Smartwatch

How often do you have to worry about your cell phone running out of battery when you have a whole heap of things to do today? Have you ever forgotten your phone at home while hurrying to work in the morning? And how did you feel this day? Waiting for an important call, you have to carry your cell phone everywhere (even to the toilet)? And what it is like when you are in a crowded transport and your phone starts ringing being in...

Read More