card__image

Webcam Cover: Paranoia or Necessity

Disculpa, pero esta entrada está disponible sólo en en, ru y ua. There are two types of users: those who tape over webcamera and those who do not. Who is in the right and why? Let’s get this sorted out.   Webcam covers block your device’s camera to provide protection against webcam hacks. Webcam covers […]

card__image

The Biggest Hacks of 2021

Disculpa, pero esta entrada está disponible sólo en en, ru y ua. Over the past couple of years, it has become hard to ignore that the digital life we all live in is completely exposed to cybercriminals. Hackers are happy to take almost any opportunity to make money or have fun, from creating free gym […]

card__image

Cyber Pandemic: Worldwide Drill

Disculpa, pero esta entrada está disponible sólo en en, ru y ua. What would you do if today you couldn’t access your bank accounts, the Internet, or your cell phone suddenly stopped working? A pretty unpleasant scenario, but a very real one. Cybersecurity was one of the top topics on the global agenda during the […]

card__image

Hackers In Movies: Top 10 Scene Analysis

Disculpa, pero esta entrada está disponible sólo en en y ru. More and more hacker scenes are popping up on screens, but how realistic are they? Keren Elazari, a world-renowned cybersecurity analyst and white hacker, decided to rate cyber episodes from popular movies and TV shows. She knows how everything should be because she has […]

card__image

10 Cybersecurity Myths

Disculpa, pero esta entrada está disponible sólo en en y ru. On the Dark Web, you can find various manuals on «how-to commit» cybercrime. Endless lists of logins, passwords, account numbers, and even phone support lines for victims to call – all this can be easily bought online.  However, one should not think that Dark […]

card__image

Data at Risk: API Vulnerabilities

Disculpa, pero esta entrada está disponible sólo en en y ru. We encounter Application Programming Interface (API) every day, and we don’t even realize it. Often when creating their web page, companies use ready-made solutions that are already on the market. Most modern sites implement at least a few third-party APIs. How does this work […]