top of page
Search


Who really hacked that? Attribution of hacker attacks.
News agencies are full of headlines, where country-backed hacker groups are presented as originators of hacker attacks. Usually, we are...

Alexey
May 27, 20201 min read


Internet of things: what is that and what its biggest security problem
Internet of things is a name describing interconnection of all our devices between each other and with the internet. This is mostly about...

Alexey
May 25, 20201 min read


Vulnerabilities magnitude: CVSS
In the world of cybersecurity, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can...

Alexey
May 23, 20201 min read


Digital signature in Layman's terms
The incredible thing, but all the cryptography consists of three types of cryptographic transmutations only: Hash, when you create a...

Alexey
May 21, 20202 min read


Hacker stuff: Screen crab - you see, I see
Having a look at what malicious devices really look like is refreshing and a great addition to reading about security. This article is...

Alexey
May 20, 20201 min read


Hardware Security Module (HSM) – what is that?
If you ever encrypted something, most likely you bumped into a necessity to handle somehow cryptographic keys. If not, then an...

Alexey
May 19, 20201 min read


Accumulated vulnerabilities or advantage of Apple on Android
Vulnerability is a flaw in the software. In other words, it is a mistake that could lead to unpredicted application behaviour and could...

Alexey
May 18, 20201 min read


Exploit vs vulnerability
Recently we spoke about malicious software (malware). The basis of every malicious software is exploit. The foundation of every exploit...

Alexey
May 15, 20201 min read


Blabla-ware: types of malicious programs
A vulnerability can be used in a variety of ways. These methods are reflected in the names of different types of malicious software....

Alexey
May 14, 20201 min read


Hacker stuff: How Pineapple can steal my data?
One thing is to read about security vulnerabilities, passwords and concepts. Another thing is to know how it actually happens and how...

Alexey
May 13, 20201 min read


Is datacentre in the nuclear bunker is the most secured place?
In one of the previous posts, we postulated that 100% security does not exist. Security is always a compromise with availability,...

Alexey
May 12, 20201 min read


What is bug bounty?
Recently we spoke about zero-day vulnerabilities. It appeared that they could cause a lot of harm in case if a functional exploit exists....

Alexey
May 11, 20202 min read


qwerty vs $0Ps: passwords I will never use and why
Not so far ago, we talked about the necessity to act, passwords and rainbow tables. Salt is used to help to protect you from rainbow...

Alexey
May 8, 20202 min read


If I know security, I am protected. Not really!
Within security boundaries, knowledge without action is practically pointless. Knowledge is the essential thing, but it is not enough by...

Alexey
May 6, 20201 min read


A zero-day vulnerability is ... hmmm?
In one of the initial posts, we found out that 100% protection does not exist. It appeared that something hacked is just a function of...

Alexey
May 5, 20202 min read


Oh, no one knows my password, for sure
In the last post, we spoke about hash and salt. As a continuation of passwords topic, today I want to walk with you through real case...

Alexey
May 4, 20201 min read


Give me some salt, and I will better protect you
Yesterday we spoke about hash and rainbow tables. It turned out that pure hashing theoretically protects against password exposure, but...

Alexey
May 1, 20202 min read


Rainbow tables
In the previous post, we learned about hashes. Its main feature is that it is a one-way function. If you hashed your password, you could...

Alexey
Apr 30, 20201 min read


One way only, one way only ou-ou-ouu...
In the previous post, we spoke about biometric authentication. Let's look today on another member of the triad. Let it be "something I...

Alexey
Apr 29, 20201 min read


What if someone has my face? Biometric systems principal limitations
In the last post, we found out that face or iris of an eye or fingerprint or voice or any other unique human biological attribute could...

Alexey
Apr 28, 20202 min read
bottom of page
