Ann Korobkina

69 Flips | 2 Magazines | 7 Likes | @AnnKorobkina | www.protectimus.com

10 Basic BYOD Security Rules

Posted By Maxim Oliynyk on Jun 9, 2016 | 0 comments<p>Up to now not everyone knows what is BYOD (bring your own device). But anyone who uses a personal …

BYOD

Ransomware - to Pay or Not to Pay

Posted By Denis Shokotko on Jun 6, 2016 | 0 comments<p>Just recently, a new “creative” ransomware called <i>CryptMix</i> revealed itself in the malware family. …

Cybersecurity

Why Gamers Need 2-Step Verification

Posted By Denis Shokotko on Apr 28, 2016 | 0 comments<p>Online games ceased to be considered a not serious occupation long ago. Today not only students …

Anti-Virus Software

Dutch Scientists: SMS Verification Is Vulnerable

Posted By Anna on May 16, 2016 | 0 comments<p>Computer security experts in their confrontation with the hackers are always trying to work ahead of the …

IT security

Panama Papers Leak - Evil or Good?

Posted By Maxim Oliynyk on May 18, 2016 | 1 comment<p>Information bomb, known as the “<i>Panama Papers Leak</i>,” was planted a year ago, although it was …

Corruption

10 Things You Can Do with the Smartwatch

Posted By Morgan on May 20, 2016 | 2 comments<p>How often do you have to worry about your cell phone running out of battery when you have a whole heap …

Smartwatches

Protectimus Cuts the Prices - Protectimus Solutions

Posted By Anna on May 26, 2016 | 0 comments<p><i>Two-factor authentication</i> is an indispensable element of modern information security system. Today, every …

Tariffs

Watch: A Card Skimmer Installed in 3 Seconds

Posted By Anna on Apr 18, 2016 | 2 comments<p>Not so long ago we wrote about tricks the fraudsters use for credit card frauds or identity thefts (and …

Identity Theft

Biometric Authentication - Pros and Cons

Posted By Maxim Oliynyk on Nov 13, 2015 | 3 comments<p>The popularity and availability of information technologies are constantly increasing. And at the …

Information Systems

Mobile Authentication Pros and Cons

Posted By Denis Shokotko on Dec 29, 2015 | 15 comments<p>The popularity of mobile devices increases every day. Smartphones, tablet computers, smart …

Information Systems

The Worst Passwords of 2015

Posted By Anna on Jan 25, 2016 | 2 comments<p>It is not a secret that the Internet users tend to choose weak and unreliable passwords. And even more! …

Information Systems

Will passwords survive?

Posted By Anna on Jan 4, 2016 | 0 comments<p>In a rapidly changing world, even the things that seem unshakable and undeniable can change. One of such …

Information Systems

Will Google's Authentication without Passwords Be Safe?

Posted By Anna on Jan 11, 2016 | 4 comments<p>I guess that’s not only me, who’s tired of passwords: we should remember them, they should be strong …

Authentication

Strong Authentication Methods in 2016 – What to Expect?

Posted By Maxim Oliynyk on Jan 22, 2016 | 1 comment<p>At the beginning of the new year, everyone is trying to predict what it will bring: what trends …

Authentication

Protectimus New OTP tokens - Protectimus Solutions

Posted By Anna on Feb 25, 2016 | 0 comments<p>The range of Protectimus OTP tokens is expanded with new hardware tokens for one-time passwords …

Batteries

Why is healthcare data security so important

Posted By Maxim Oliynyk on Mar 2, 2016 | 0 comments<p>Health is the main value of every person. But we start understanding it only when there is a …

Identity Theft

Two-Factor Authentication in Cloud Security

Posted By Anna on Mar 21, 2016 | 0 comments<p>Today, cloud services are incredibly popular both among users who store their personal data there and …

Authentication

Hackers Are Adopting Espionage Techniques

Posted By Anna on Mar 10, 2016 | 3 comments<p>A year ago, a prominent hacker group <i>Carbanak</i> became famous for being the first to break into the banking …

Cybersecurity

The Most Prominent Data Leaks of 2015

Posted By Morgan on Mar 22, 2016 | 0 comments<p>In 2015, we faced many ambitious and controversial data leaks. Thus, we can mace a conclusion: hackers …

Personal Data

These unlucky people have names that break computers

A few people have names that can utterly confuse the websites they visit, and it makes their life online quite the headache. Why does it happen?<p><i>This story is featured in BBC Future’s “Best of 2016” collection. Discover more of our picks.</i><p>Jennifer Null’s husband had warned her before they got married …

Computer Systems

Data Protection Mishap Leaves 55M Philippine Voters at Risk

Every registered voter in the Philippines is now susceptible to fraud and other risks after a massive data breach leaked the entire database of the …

Security

The Evolution of Two-Step Authentication

Posted By Anna on Apr 4, 2016 | 0 comments<p>With the advent of computer technologies in everyday life, the protection of data transmitted and stored in …

Mobile Virus Android.Bankosy Intercepts OTP Passwords

Posted By Denis Shokotko on Feb 8, 2016 | 5 comments<p>We store a lot of important information in the network: personal correspondence, photos, …

'Star Wars' is now one of the most popular passwords

<b>4g0t your Pa55word?</b><p>Each year, security company SplashData lets the internet know which were the most popular stolen passwords.<p>They are based on over two million passwords leaked over the last 12 months.<p>And it looks like Star Wars references have become a fashionable way to secure accounts.<p>These are …

Foo Fighters

Do you have one of the most common passwords? They’re ridiculously easy to guess

If your password is "123456", "qwerty" or even "password", it would be a good idea to change it right now.<p>The three terms are among the most commonly-used passwords of 2015, according to an annual ranking from a security group.<p>SplashData, which collates passwords from data breaches in America and …

Two-factor authentication 2015

Posted By Denis Shokotko on Nov 5, 2015 | 10 comments<p>Modern technologies have brought a lot of conveniences and opportunities into our lives, but …

How To: How Thieves Unlock Passcodes on Stolen iPhones (And How to Protect Yourself Against It)

Back in 2010, iOS developer Daniel Amitay developed a camera security app for iPhones that used an unlock screen almost identical to that of the …

One-time passwords: generation algorithms and tokens

Posted By Denis Shokotko on Nov 2, 2015 | 0 comments<p>The use of one-time passwords<p>Amid the constantly growing online business segment, data protection …