The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?
Sep28

The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?

Why Is Two-Factor Authentication Necessary? Increasingly more companies are using two-factor authentication in their online operations. Sometimes, it surprises or even annoys their users. They may think: why waste my precious time on entering additional characters? Isn’t a password sufficient? With the widely spread advanced computer technologies, we have possibilities that our parents could only read about in science fiction novels....

Read More
Strong Password
Sep25

Strong Password

– Sorry, your password has been used for more than 30 days, you must choose a new one! – Roses. – Excuse me, your new password is too short! – Pink roses. – Excuse me, a strong password should contain at least one number! – 1 pink rose. – Sorry, you cannot use spaces in your password! – 1pinkrose. – Sorry, you must use at least 10 different characters in a password! –...

Read More
What Hides Beneath SMS Authentication?
Jul12

What Hides Beneath SMS Authentication?

We have to pay for everything in life. Whatever you may call it — the law of conservation of energy, karma, or Divine Providence — that is how it is and how it will always be. In the 19th century, a postal courier loyal to his sovereign would risk his life delivering a letter to the addressee, which took up to a month, protecting it from any possible foes. In the 21st century, data exchange is carried out instantly, but it is a lot...

Read More
Tokens with the CWYS Function
Apr21

Tokens with the CWYS Function

To test the CWYS function and learn more about 2-factor authentication visit our demo page: Demo Protectimus offers the following OTP tokens with the CWYS (Confirm What You See) function support: Protectimus Ultra Protectimus Smart Protectimus SMS Protectimus Mail Let’s look at them in more detail. Protectimus Ultra It is a physical (hardware) token that has a number of advantages as compared to other hardware tokens,...

Read More
Detailed Information on Data Signing
Mar13

Detailed Information on Data Signing

In response to new challenges, Protectimus has developed a powerful means of protection against auto-filling, injecting, and other types of malicious software that manipulates and modifies data during transactions. There are different ways in which such software can work; for example, the recipient is changed during a transfer as an unsuspecting user enters a one-time password sent via an SMS message. The problem is that this user...

Read More