Interesting Trends and Latest News

Image Description

Simplify and secure your online accounts and logins with the MIRkey

August 5, 2019

As online platforms and social media becomes increasingly important for social and professional purposes, it also becomes more important to implement strong security measures. Those measures have evolved and today, just having a strong password is simply not enough. Let’s face it: no matter how strong your password is, or what level of authentication the website you are accessing is using, a skilled hacker can still compromise your login credentials.

Read more...

Image Description

The state of cryptocurrency theft - Cryptocurrency malware is now an economy

July 30, 2019
  • $1.1 billion – the amount of cryptocurrency-related thefts during the last six months
  • 12,000 – the estimated number of dark web marketplaces
  • 34,000 – the number of cryptocurrency-related theft offerings
  • $6.7 million – the monetary worth of the illegal economy comprising cryptocurrency-related malware development and sales
  • 55,000 cryptocurrency users affected in Bitpoint's $28 million hack
Read more...

Image Description

Beyond Two factor Authentication - How a hardware security key implementing FIDO can improve online security

July 11, 2019

Remember the good old days, when using only a username and password (or, one-factor authentication) was considered secure? It was, in fact, not. Even before Julian Assange broke into the Pentagon, systems were compromised using brute-force password attacks. You can think of one-factor authentication as "something you know" which means that whoever knows your password, can access your account.

Read more...

Image Description

Myth debunked - Password safes and security keys are not the same thing

June 26, 2019

Passwords managers (or password safes as they are also known) such as LastPass, Dashlane, and Enpass are often confused with hardware security keys. Of course, one can use a hardware security key to secure a password safe and, in this context, a hardware security key can complement a password manager. But before we get into the technicalities, let’s first define the concepts “password manager” and “hardware security key” whereafter we’ll delve into the differences between the two concepts in order to highlight why a hardware security key is the superior option.

Read more...

Image Description

Good bye passwords, hello security keys

The use of a password is an ancient concept. You can see in your mind’s eye a medieval guard at the door asking, slightly slurred, “what’s the password?” and then either letting you “pass” with the right “word” - or chopping off your head if you get it wrong.

Unfortunately this ancient concept has been transferred into the digital domain with dire consequences.

Thankfully, with the advent of Webauthn and hardware security keys we can see the end in sight.

Read more...

Image Description

13 Cyber Security Statistics that will make you rethink your IT security plan

January 30, 2019

Cyber security is a rapidly expanding industry. Malware is exponentially increasing with over 230 000 new malware samples per day. It could be compared with World War One and Two where for each attack there was a counter attack or defence strategy. Billions of dollars were spent on research and development all around the globe in order to protect one's own and to outsmart the enemy. In the modern day digital arena, a similar story is panning out in cyber space. Attackers are trying new, clever ways to hack whatever they can while IT security specialists are making this harder by trying to stay one step ahead. Read more...

Image Description

Over 560 000 people downloaded fake games infected with malware from the Google Play Store

December 5, 2018

One would expect that anything trending on Google Play Store will be safe to download and install on your android device. But in a recent incident over 560 000 people downloaded games on the Play Store that were infected with malicious malware. This proves that one can never assume it is safe to download something just because it is distributed from a famous brand’s cloud platform. Read more...

Image Description

Five best practices to Avoid Cyber Attacks

November 29, 2018

The question one has to ask yourself isn’t about whether or not to protect your servers and cloud backend against malware and other malicious attacks. The question is, is what I have in place to protect my IT environment against cyber-attacks secure enough? And the answer is also not always that simple. Read more...

Subscribe to receive updates

* indicates required