card__image

How To Create A Strong Password: Step-By-Step Guide

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Безусловно каждый из нас хочет защитить от посягательств свои данные, но часто люди пренебрегают даже элементарными правилами безопасности. Например, многие учетные записи […]

card__image

Hackers In Movies: Top 10 Scene Analysis

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Всё чаще сцены с участием хакеров мелькают на экранах, но насколько они реалистичны? Керен Элазари, всемирно известный аналитик в сфере кибербезопасности, белый […]

card__image

Hackers’ Secrets: What They Don`t Want You To Know

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Мы не драматизируем, но интернет полон невидимых ловушек. Такое ощущение, что за каждым углом поджидает хакер, который не прочь поживиться за ваш […]

card__image

10 Cybersecurity Myths

On the Dark Web, you can find various manuals on “how-to commit” cybercrime. Endless lists of logins, passwords, account numbers, and even phone support lines for victims to call – all this can be easily bought online.  However, one should not think that Dark Web is absolutely anonymous. The FBI has been using proven methods […]

card__image

Data at Risk: API Vulnerabilities

Sorry, this entry is only available in Russian. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Мы каждый день сталкивается с Application Programming Interface (API) – интерфейс программирования приложений, и даже этого не подозреваем. Часто при создании своей […]

card__image

Work from Home As The New Threat Gateway

The world shifted to a remote work model in response to the COVID-19 pandemic last year. At first, that was more necessity than preference, but today some employers are not going to return to their former office mode.   However, one less obvious but nevertheless critical challenge relates to cybersecurity risks due to distributed work […]

card__image

How Smartphones Became A Human Kryptonite

Is your phone really listening to you?   Revisiting the truth behind this concerning issue with Edward Snowden In a recent interview by Joe Rogan Experience (JRE) Clips, Edward Snowden, an ex-CIA employee discussed whether smartphones are listening to our conversations.   For instance, have you noticed that shortly after talking about going on a […]

card__image

The Collapse Of Social Media Security

Major hacks of social media platforms or a tale of 3 data ‘leaks’: Clubhouse, LinkedIn, Facebook.   Following is a list of three major security breaches to have impacted social media platforms over the past week. You’ve likely seen reports of new data hacks on Facebook and LinkedIn, which have exposed the personal information of […]