card__image

Disclosure: What Passwords Say About the People Who Choose Them

Sorry, this entry is only available in Russian and Ukrainian. For the sake of viewer convenience, the content is shown below in one of the available alternative languages. You may click one of the links to switch the site language to another available language. О паролях сказано и известно многое. Большинство из них короткие, простые, […]

card__image

Fingerprint cloning: Is it real?

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. ТЕЛЕФОННЫЕ И КОМПЬЮТЕРНЫЕ СКАНЕРЫ ОТПЕЧАТКОВ ПАЛЬЦЕВ МОЖНО ПОБЕДИТЬ С ПОМОЩЬЮ ТРЕХМЕРНОЙ ПЕЧАТИ   Введение Пароли — это традиционные методы аутентификации для компьютеров […]

card__image

InfoSec And Cybersecurity – What’s The Difference?

Information security and cybersecurity share the same goals of protecting people, data, and devices. The difference between the two areas is the approach and scope of protection.   Information security (InfoSec)   Information security refers to protecting data from accidental or intentional interference. The methods are grouped into technical, administrative, legal, and physical.   Technical […]

card__image

How to Get Your First Job in Cybersecurity

Sorry, this entry is only available in Ukrainian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Стаття для тих, хто тільки визначається, або вже починає свій шлях в кібербезпеці. Розглянемо питання, які найчастіше цікавлять новачків: 🔸Які професії існують […]