2FA Chatbots vs. SMS Authentication
Oct22

2FA Chatbots vs. SMS Authentication

In this article, we’ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We’ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication. Table of contents: How did the Protectimus Bot token come to be? How does two-factor authentication with chatbots work? 2FA...

Read More
4 Reasons Two-Factor Authentication Isn’t a Panacea
Dec14

4 Reasons Two-Factor Authentication Isn’t a Panacea

Two-factor authentication (2FA) is an indispensable cybersecurity measure used to protect data. Most of the modern information security standards despite the area of application such as PCI DSS, PSD2, HIPAA, etc., demand the multifactor authentication (MFA) among other data protection methods. This approach allows mitigating the danger coming from such attack vectors as brute force password cracking, keylogging, social engineering,...

Read More
10 Most Popular Two-Factor Authentication Apps Compared
Feb21

10 Most Popular Two-Factor Authentication Apps Compared

This article discusses two-factor authentication apps, which feature different functionalities, are based on different principles but serve one purpose – reliable protection of access to sensitive information. Today, we will try to review some of the most popular applications for one-time passwords generation from the Google Play market and two hardware OTP tokens that can replace two-factor authentication apps. There are a lot...

Read More
10 Things You Can Do with the Smartwatch
May20

10 Things You Can Do with the Smartwatch

How often do you have to worry about your cell phone running out of battery when you have a whole heap of things to do today? Have you ever forgotten your phone at home while hurrying to work in the morning? And how did you feel this day? Waiting for an important call, you have to carry your cell phone everywhere (even to the toilet)? And what it is like when you are in a crowded transport and your phone starts ringing being in...

Read More
Dutch Scientists: SMS Verification Is Vulnerable
May16

Dutch Scientists: SMS Verification Is Vulnerable

Computer security experts in their confrontation with the hackers are always trying to work ahead of the curve: to model and foresee probable “loopholes” in the data protection systems of different services and operating systems. In recent years, special attention has been paid to the mobile operating systems as more and more people use smartphones to enter their accounts or use them as 2-step verification means. Most...

Read More