Profile cover photo
Profile photo
Protectimus Solutions LLP
21 followers
21 followers
About
Posts

Post has attachment
We reviewed almost all two-factor authentication types and methods available today: SMS authentication, 2FA apps, U2F tokens, contactless hardware tokens, programmable OTP tokens, and biometric authentication. Compare the pros and cons of each, and choose the best for you!

https://goo.gl/UwPLVE

#authentication #2FA #2FactorAuthentication #SMSauthentication #OTP #OTPtokens #security #cybersecurity #infosec #TwoFactorAuthentication
Add a comment...

Post has attachment
Google Docs and Dropbox phishing, emails with infected attachments, Deceptive, Spear, CEO phishing, and one of the newest branches of phishing called pharming. A few words about all these threats and a few tips how to protect yourself from them: https://www.protectimus.com/blog/7-tips-from-phishing-scams/
Add a comment...

Post has attachment
Protectimus Slim NFC Tokens in New ID1 Format with EPD Displays

Programmable hardware OTP tokens Protectimus Slim NFC are now available in two form factors: already familiar to many mini-cards Protectimus Slim mini NFC 64 x 38 x 0.9 mm in size and an updated token of the standard ID1 format 85.60 x 53.98 x 1 mm in size (the size of an ordinary banking card). Besides, OTP tokens of ID1 format are equipped with modern energy-efficient EPD displays. In everything else, the tokens function identically. They are programmed via NFC using the Protectimus TOTP Burner application for Android smartphones, support 16-32 characters long (in Base32) secret keys, and generate 6-digit one-time passwords. You can order programmable OTP tokens here: https://www.protectimus.com/slim-mini/. Please, specify the desired size of the token in the comments.
Photo
Add a comment...

Post has attachment
+Protectimus Solutions LLP' Head of R&D +Denys Shokotko about WannaCry virus live for +i24NEWS
Add a comment...

Post has attachment
Yet another threat to users’ safety is becoming increasingly prevalent — malicious advertising or malvertising. Malicious advertising itself isn’t new, but recently, its use has become alarmingly widespread: last year, there have been almost twice as many instances of malicious advertisements than there were in 2015. Of the 80 million sites analyzed by researchers in 2015, 19,000 pages were found to be infected; in 2016, nearly 30,000 such pages have been found. The total number of pages checked was the same for both periods.

So, what exactly is malvertising, and what makes it so dangerous? Read in our blog: https://www.protectimus.com/blog/malvertising/
Add a comment...

Post has attachment
Card skimming, implemented through card reading slips on ATM machines, is familiar to many. Nowadays this type of credit card fraud is also appearing on the web. Of course, it is improved and adapted according to its new ‘habitat'. But the crux of the matter remains the same: the theft of credit card information for its use in criminal undertakings.

So what is online skimming and how to avoid it? Read in this article: https://www.protectimus.com/blog/online-skimming/
Add a comment...

Post has attachment
On the website of the company Niantic in the section dedicated to #pokemongo ‬, one can find the publicly-available confidentiality policy. It’s a shame that people rarely read the EULA. Pokemon GO can spy on gamers and pass their personal data on to third parties. More about that read on our blog: http://bit.ly/2br4ezw
Add a comment...

Post has attachment
Messaging apps overview. #messenger   #viber   #skype   #telegram   #signal   #whatsapp   #threema  ‬ - which #messaging   #apps  are really trustworthy? http://bit.ly/2aXQj0J
Add a comment...

Post has attachment
Recently a team of experts led by a group of Google employees surveyed more than 1500 users to discover what causes them to choose different #messaging   #apps ‬. Unfortunately, their security was the least important feature for most users. The greatest factor turned out to be how many of the user’s friends themselves used the app. The survey also showed that users value free messengers — especially those preinstalled on their devices. Very few respondents said that they care about secure messaging apps.

Taking into consideration that messaging apps are widely used for the transmission of confidential data in both personal and professional spheres, attackers who have gained access to such apps can quickly find interesting information. Thus, we have made a list of features you should pay attention to when choosing a secure messaging app: http://bit.ly/2aX5QOT
Add a comment...

Post has attachment
We’re happy to announce that Protectimus’ #2FA  solution is now available to users of #CitrixNetScaler‪  Access Gateway. Our two-factor authentication system, having demonstrated its full compatibility with Citrix NetScaler Gateway, has been certified and received the status of ‪#‎CitrixReady‬. Now all companies using #Citrix  Access Gateway for remote access to virtual machines and applications can effortlessly and effectively integrate Protectimus’ two-factor authentication solution into their security systems, which makes illicit access much more difficult.
Add a comment...
Wait while more posts are being loaded