card__image

Webcam Cover: Paranoia or Necessity

Ci spiace, ma questo articolo è disponibile soltanto in en, ru e ua. There are two types of users: those who tape over webcamera and those who do not. Who is in the right and why? Let’s get this sorted out.   Webcam covers block your device’s camera to provide protection against webcam hacks. Webcam […]

card__image

The Biggest Hacks of 2021

Ci spiace, ma questo articolo è disponibile soltanto in en, ru e ua. Over the past couple of years, it has become hard to ignore that the digital life we all live in is completely exposed to cybercriminals. Hackers are happy to take almost any opportunity to make money or have fun, from creating free […]

card__image

Cyber Pandemic: Worldwide Drill

Ci spiace, ma questo articolo è disponibile soltanto in en, ru e ua. What would you do if today you couldn’t access your bank accounts, the Internet, or your cell phone suddenly stopped working? A pretty unpleasant scenario, but a very real one. Cybersecurity was one of the top topics on the global agenda during […]

card__image

The Most Common Types of Cyber Attacks in 2021

Ci spiace, ma questo articolo è disponibile soltanto in en, ru e ua. The number of cyber incidents in 2021 is already frightening, even though only six months have passed. Breaking into a water utility system in Florida and attempting to poison the water for 15,000 residents. A cyberattack on the 9News Australia channel canceled […]

card__image

Hackers In Movies: Top 10 Scene Analysis

Ci spiace, ma questo articolo è disponibile soltanto in en e ru. More and more hacker scenes are popping up on screens, but how realistic are they? Keren Elazari, a world-renowned cybersecurity analyst and white hacker, decided to rate cyber episodes from popular movies and TV shows. She knows how everything should be because she […]

card__image

10 Cybersecurity Myths

Ci spiace, ma questo articolo è disponibile soltanto in en e ru. On the Dark Web, you can find various manuals on “how-to commit” cybercrime. Endless lists of logins, passwords, account numbers, and even phone support lines for victims to call – all this can be easily bought online.  However, one should not think that […]

card__image

Data at Risk: API Vulnerabilities

Ci spiace, ma questo articolo è disponibile soltanto in en e ru. We encounter Application Programming Interface (API) every day, and we don’t even realize it. Often when creating their web page, companies use ready-made solutions that are already on the market. Most modern sites implement at least a few third-party APIs. How does this […]

card__image

Work from Home As The New Threat Gateway

Ci spiace, ma questo articolo è disponibile soltanto in en, ru e ua. The world shifted to a remote work model in response to the COVID-19 pandemic last year. At first, that was more necessity than preference, but today some employers are not going to return to their former office mode.   However, one less […]