Why Gamers Need 2-Step Verification
Apr28

Why Gamers Need 2-Step Verification

Online games ceased to be considered a not serious occupation long ago. Today not only students but also bankers, senior managers, and other adult solid people play computer games. For some, it has even become a rather profitable profession. Even if the game is played just for fun, it is still about large sums of money: to buy bonuses and gaming resources, upgrade items and characters. Besides, paid online games are growing in...

Read More
The Evolution of Two-Step Authentication
Apr04

The Evolution of Two-Step Authentication

With the advent of computer technologies in everyday life, the protection of data transmitted and stored in the network has become a necessity. Along with the hardware and software components, the data protection systems must include authentication tools that can prevent unauthorized access to the accounts. At first, the usual reusable passwords seemed a quite sufficient protection means. But, it soon became clear that this way of...

Read More
Two-Factor Authentication in Cloud Security
Mar21

Two-Factor Authentication in Cloud Security

Today, cloud services are incredibly popular both among users who store their personal data there and among the companies that use cloud services for a successful business. We shouldn’t underestimate the importance of the cloud, as a means to store the employees’ personal data and the necessary corporate information, which is available to an employee at any time and at any place. But we shouldn’t forget about cloud security...

Read More
Two-Step Authentication Is Already in Instagram
Mar07

Two-Step Authentication Is Already in Instagram

Few days ago it became known that Instagram starts rolling out two-factor authentication. At first, a beta version of 2FA was tested by a small number of selected users. But now two-step authentication becomes available to everyone. But what is the most surprising about this news is that the popular social network has moved to it so slowly. After all, two-factor authentication has long been an integral part of data protection of all...

Read More
Mobile Trojan Virus Android.Bankosy Intercepts One-Time Passwords
Feb08

Mobile Trojan Virus Android.Bankosy Intercepts One-Time Passwords

We store a lot of important information in the network: personal correspondence, photos, documents. For the most part, these are spiritual values – precious memories and the fruits of hours-long labor. But the Internet also stores rather concrete financial ‘matters’: our money. Today many people use online banking, as it is convenient to transfer funds, to pay for the services, and to control your accounts online. It is no...

Read More