top of page
Search


Who really hacked that? Attribution of hacker attacks.
News agencies are full of headlines, where country-backed hacker groups are presented as originators of hacker attacks. Usually, we are...
Alexey
May 27, 20201 min read
Â
Â
Â


Internet of things: what is that and what its biggest security problem
Internet of things is a name describing interconnection of all our devices between each other and with the internet. This is mostly about...
Alexey
May 25, 20201 min read
Â
Â
Â


Vulnerabilities magnitude: CVSS
In the world of cybersecurity, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can...
Alexey
May 23, 20201 min read
Â
Â
Â


Digital signature in Layman's terms
The incredible thing, but all the cryptography consists of three types of cryptographic transmutations only: Hash, when you create a...
Alexey
May 21, 20202 min read
Â
Â
Â
bottom of page
