Penetration Testing: zero in on security 0

Penetration testing or pentesting evaluates security system of a ready software. Its main goal is to detect potential vulnerabilities by simulating malicious attacks. Pentesting helps to improve software security basing

Read More

Data Breaches: why to watch your back 0

In 2018, cybersecurity still remains a stumbling rock. Last year showed that hackers’ attacks became more sophisticated. In comparison to 2016, the number of data breaches in 2017 was 44.7%

Read More

How spammers get your data from health and fitness apps? 0

Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you

Read More

Forget the password? Then scan your finger 0

How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct

Read More

Can cyber security culture ensure hacker’s wipeout? 0

Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems

Read More

Security Testing Tools You Need to Know 0

The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,

Read More