Self-Driving Cars: New Cybersecurity Challenge
Jul26

Self-Driving Cars: New Cybersecurity Challenge

Sometimes there is a feeling that we live in a science fiction novel. Kitchen appliances cook dinner when we return from work. TVs remember viewers’ preferences. Smart cars suggest a way to bypass traffic jams and adjust the temperature in the cabin… Yet people have a place in this high-tech chain. We manage smart devices – give orders and monitor their execution. But it seems that very soon smart devices will be able to...

Read More
Do we need multi-factor authentication in social networks?
Jul15

Do we need multi-factor authentication in social networks?

No one tries to contradict that multi-factor authentication is very important for corporate and personal accounts – especially those relating to financial assets turnover. But for many users, strong authentication in social networks seems an excessive caution. Usually, people use social networks for entertainment, socializing with friends, and following the news. The majority of social networks profiles have no relation to money...

Read More
10 Basic BYOD Security Rules
Jun09

10 Basic BYOD Security Rules

Up to now, not everyone knows what is BYOD (bring your own device). But anyone who uses a personal laptop or smartphone to gain access to corporate resources uses this technology even though may have no idea about it. This trend gradually penetrates even the “classic” offices, not to mention the companies whose employees work distantly! The “bring your own device” concept emerged in the early 2000s. But an...

Read More
Ransomware – to Pay or Not to Pay
Jun06

Ransomware – to Pay or Not to Pay

Just recently, a new “creative” ransomware called CryptMix revealed itself in the malware family. The ransomware promises its victims to transfer their money to a children’s charity. This statement might seem like a funny joke, but most likely the victims of this virus deprived of an access to their files do not consider it funny at all. Moreover, so far it is impossible to decrypt the CryptMix with modern decryption...

Read More
Turn on Two-Factor Auth on Linkedin Today
Jun03

Turn on Two-Factor Auth on Linkedin Today

Another scandal with hacked accounts has rocked the network and gave us another reason to think of the importance of two-factor auth for everyone. This time, the data protection system of LinkedIn, the largest social network for business people, was compromised. Actually, this data leakage happened four years ago, in summer 2012. Back then hackers got an access to the email addresses and passwords of the LinkedIn users. Shortly after...

Read More