top of page
Search


Who really hacked that? Attribution of hacker attacks.
News agencies are full of headlines, where country-backed hacker groups are presented as originators of hacker attacks. Usually, we are...
Alexey
May 27, 20201 min read


Internet of things: what is that and what its biggest security problem
Internet of things is a name describing interconnection of all our devices between each other and with the internet. This is mostly about...
Alexey
May 25, 20201 min read


Vulnerabilities magnitude: CVSS
In the world of cybersecurity, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can...
Alexey
May 23, 20201 min read


Digital signature in Layman's terms
The incredible thing, but all the cryptography consists of three types of cryptographic transmutations only: Hash, when you create a...
Alexey
May 21, 20202 min read
bottom of page
