How spammers get your data from health and fitness apps? 0

Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you

Read More

Forget the password? Then scan your finger 1

How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct

Read More

Can cyber security culture ensure hacker’s wipeout? 0

Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems

Read More

Security Testing Tools You Need to Know About 0

The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,

Read More

Hacking: Pluses and Minuses 0

Nowadays hacking is rather popular. Some people are engaged in hacking activity because of personal illegal profit, using confidential or personal information for blackmailing or something like this. For others,

Read More

What Are the Threats of Software Products? 0

The main aim of security testing is to remove all critical flaws in the security system of software products. The specialists apply different techniques and methods in order to detect

Read More