Will Google’s Authentication without Passwords Be Safe?
I guess that’s not only me, who’s tired of passwords: we should remember them, they should be strong enough not to be guessed or brute forced, and even more, they should be different for each website. But it has recently turned out, that not only I think so. A few days ago I have come across the information that Google is testing a new system of authentication without passwords that will allow refusing the password entry...
How to Choose and Use Strong Passwords
In 2007, the most popular password among the Internet users was the word ‘password’. Later, people have realized that strong passwords should include not only letters but also numbers. And in 2008 “password1” became the users’ favorite password. Despite all efforts of cyber security experts, who tried to explain to the average users, that predictable and frequently used passwords cannot be trustworthy,...
The Most Common Ways of Credit Card Fraud
The faster is the technical progress developing, the more sophisticated and ingenious become the fraudsters’ attempts to turn it to their advantage. The more actively we replace cash money in our pockets with credit cards, the more ways to hack money from our bank accounts emerge. Not to become an easy prey for fraudsters, it is useful to know what techniques the violators use to steal data from credit cards. We are going to provide...
Why Everyone Should Care About Data Protection
There is an opinion that an average Internet user can not be a subject of interest for hackers and other thieves of confidential data. The head of the CIA or celebrity is a completely different story. But what can hacker expect from an ordinary person? No intriguing secrets, no big money. It seems like there is no need in data protection for common people. But everyone thinking this way is seriously mistaken. There are a lot of...
What Is Phishing and How Not to Fall into Its Nets
Phishing is a special kind of online fraud, which presupposes fishing out the user’s login and password or another sensitive information with the aim to enter the naive user’s account and to cause damage both to the user and to the system the hacker managed to get access to. What is the phishing attack and what are its objectives? One of the main phishing methods is mass mailing, often from a bank or another service. For...