How spammers get your data from health and fitness apps?
20.11.2017
Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you
Read MoreForget the password? Then scan your finger
01.11.2017
How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct
Read MorePositive UX – how to make wow effect simple
16.06.2017
Do you return home if you forget your phone on a table? Can you live at least one day without any gadget or PC? According to the report made by
Read MoreCan cyber security culture ensure hacker’s wipeout?
01.06.2017
Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems
Read MoreSecurity Testing Tools You Need to Know
26.04.2017
The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,
Read MoreHacking: Pluses and Minuses
20.04.2017
Nowadays hacking is rather popular. Some people are engaged in hacking activity because of personal illegal profit, using confidential or personal information for blackmailing or something like this. For others,
Read MoreWhat Are the Threats of Software Security?
22.03.2017
The main aim of security testing is to remove all critical flaws in the security system of software products. The specialists apply different techniques and methods in order to detect
Read MoreWhat Is WPA (Wi-Fi Protected Access)?
03.03.2017
Wireless networking has become very popular and many people were and still are not interested in the way the data is sent through the air and how this information can
Read MoreUnit vs Integration vs Functional Testing
01.03.2017
There are various types of software testing and the QA specialists should be aware of their specific features and different peculiarities. If the test is engaged in mobile testing, then
Read MoreSecurity Testing Tools
23.02.2017
Nowadays, security of personal and corporate data plays an important role. And a huge attention is paid to thorough penetration testing, security testing, access control testing, etc. To check whether
Read MoreSecurity Testing Myths
15.02.2017
For various specialists, the notion ‘security’ has different meaning and includes diverse concept. In general, security means the combination of specific means that protect the product from malicious attacks and
Read More