Security

TOR: Protecting Your Right for Anonymity

Max, Test lead - October 15, 2015
Darknet

What do you conjure up in mind when you hear Darknet? Illegal weapons, pornography and drugs? Well, in fact, it is not only about it. There is a large part of Darknet which is legal and aims at protecting a person’s right for anonymity first of all. In countries with authoritarian government TOR has been a critical instrument for dissident movements. It has also proven …

Continue reading

Stop Avoiding Hacks! Fight Them, And Google Knows How!

Max, Test lead - September 29, 2015
Captain america

Let’s face it, we don’t live in a world where our resources, after being put online can be hacked. It’s more of a “when will we be hacked” kind of thing. But the bigger picture in does not necessarily has to be that way. The problem simply lies in the fact that businesses, security professionals, online resources and hackers are trapped in an endless loop. …

Continue reading

You Think You Are Safe Behind Your Cyber Defense Walls, But Have You Considered End-Users As A Threat?

Max, Test lead - March 30, 2015
man

So here we are, your software is protected, all network breaches are covered and every database is protected by trained and skilled killer bears from Russia besides the cyber-security measures you have implemented and yet you still have trouble. How so? Because your software has end users. No matter if you are an enormous corporation and your software is used by your employees only or …

Continue reading

All You Need To Know About White Hats

Max, Test lead - March 30, 2015
whitehat

White hat hackers are probably the most required profession any firm may gain from. Furthermore, governments, militaries and entire corporations fight for the best of white hats. Google even has a Security Princess, or so they have titled Parisa Tabriz’s job in their company. Parisa, by the way is an amazing White Hat that has achieved tremendous results in delivering security and is now one …

Continue reading
×