card__image

The First Summit Of The National Cyber Security Cluster In Ukraine

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. На днях в Киеве прошел первый саммит Национального кластера кибербезопасности – координационная платформа, объединяющая ресурсы, возможности, компетенции Совета национальной безопасности и обороны […]

card__image

What Is Social Engineering?

Social engineering is the art of manipulating, influencing, or deceiving to gain control over your computer system. A hacker can use the telephone, email, postal correspondence, or direct contact to gain illegal access. Examples include phishing, spear phishing, and CEO Fraud. Who is doing social engineering? It could be a hacker from the United States […]

card__image

TOP Misfortunate Passwords Of Fortune 500 Companies

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Эксперты компании NordPass назвали самые неудачные пароли компаний из списка Fortune 500.   Исследователи проанализировали общедоступные базы скомпрометированных паролей, которые затронули компании […]

card__image

A Growing Threat: Smart Buildings at Risk

More and more “smart” buildings are being built around the world, which is not surprising. Lighting, climate and elevator control, energy efficiency, fire detection, and video surveillance are just some of the benefits. However, security issues associated with the use of IoT devices, for some reason, are reluctantly talked about. Each of these functions depends […]