Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down
What seems perfectly thought out and reliable, often presents us with the most unexpected surprises. Such a sad discovery befell the creators of the car Jeep Cherokee model 2014 in July 2015, when the Internet stirred up the news about two professional hackers Chris Valasek and Charlie Miller who managed to gain remote access to the onboard computer of the seemingly “perfect” car and take the operation of its core systems under their...
Virus CoreBot Turned into a Dangerous Banking Trojan
In late August, a new Trojan Virus CoreBot was discovered by IBM specialists. At first, it did not look particularly dangerous: its possibilities were limited to stealing local passwords and personal data of users in different browser and desktop applications. However, experts were seriously concerned about the modular structure of the new threat that promised great potential for its development. And they were right. In the first ten...
Two-Factor Authentication in the PCI DSS Standard
The use of payment cards for the modern man has long been commonplace. But we do not always think about how extensive and complex is the work that was done by the companies which provide such services, how many diverse requirements they complied in order to give us the possibility simply to insert the card into the slot of the ATM and get our money or book the room in the internet before the vacation trip. Meanwhile, getting the right...
The Theft of The Century, or Why Do News Websites Need Two-Factor Authentication?
Why Is Two-Factor Authentication Necessary? Increasingly more companies are using two-factor authentication in their online operations. Sometimes, it surprises or even annoys their users. They may think: why waste my precious time on entering additional characters? Isn’t a password sufficient? With the widely spread advanced computer technologies, we have possibilities that our parents could only read about in science fiction novels....
Strong Password
– Sorry, your password has been used for more than 30 days, you must choose a new one! – Roses. – Excuse me, your new password is too short! – Pink roses. – Excuse me, a strong password should contain at least one number! – 1 pink rose. – Sorry, you cannot use spaces in your password! – 1pinkrose. – Sorry, you must use at least 10 different characters in a password! –...