Dutch Scientists: SMS Verification Is Vulnerable
May16

Dutch Scientists: SMS Verification Is Vulnerable

Computer security experts in their confrontation with the hackers are always trying to work ahead of the curve: to model and foresee probable “loopholes” in the data protection systems of different services and operating systems. In recent years, special attention has been paid to the mobile operating systems as more and more people use smartphones to enter their accounts or use them as 2-step verification means. Most...

Read More
The Evolution of Two-Step Authentication
Apr04

The Evolution of Two-Step Authentication

With the advent of computer technologies in everyday life, the protection of data transmitted and stored in the network has become a necessity. Along with the hardware and software components, the data protection systems must include authentication tools that can prevent unauthorized access to the accounts. At first, the usual reusable passwords seemed a quite sufficient protection means. But, it soon became clear that this way of...

Read More
Two-Factor Authentication in Cloud Security
Mar21

Two-Factor Authentication in Cloud Security

Today, cloud services are incredibly popular both among users who store their personal data there and among the companies that use cloud services for a successful business. We shouldn’t underestimate the importance of the cloud, as a means to store the employees’ personal data and the necessary corporate information, which is available to an employee at any time and at any place. But we shouldn’t forget about cloud security...

Read More
Two-Step Authentication Is Already in Instagram
Mar07

Two-Step Authentication Is Already in Instagram

Few days ago it became known that Instagram starts rolling out two-factor authentication. At first, a beta version of 2FA was tested by a small number of selected users. But now two-step authentication becomes available to everyone. But what is the most surprising about this news is that the popular social network has moved to it so slowly. After all, two-factor authentication has long been an integral part of data protection of all...

Read More
Mobile Trojan Virus Android.Bankosy Intercepts One-Time Passwords
Feb08

Mobile Trojan Virus Android.Bankosy Intercepts One-Time Passwords

We store a lot of important information in the network: personal correspondence, photos, documents. For the most part, these are spiritual values – precious memories and the fruits of hours-long labor. But the Internet also stores rather concrete financial ‘matters’: our money. Today many people use online banking, as it is convenient to transfer funds, to pay for the services, and to control your accounts online. It is no...

Read More