Types of two-factor authentication: pros and cons
What two-factor authentication types are out there, and which ones should be preferred.
84 articles
What two-factor authentication types are out there, and which ones should be preferred.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?
A few tips on how to establish cybersecurity communications with employees.
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
What multi-factor authentication is, why you should use it, and what “factors” there are.
Crypto mixers, nested exchanges, cash-out and other crypto-laundering methods used by ransomware operators.
In its February update, Microsoft buried Internet Explorer once and for all. Or did it? We investigate what really happened.
Alternatives to Google Chrome that take data privacy more seriously.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.
Why you should update to the latest version of Google Chrome, Microsoft Edge, Opera, Yandex Browser, Vivaldi, Brave and other Chromium-based browsers.
Once again, very serious vulnerabilities have been found in Apple operating systems. Don’t delay updating to iOS 16.4.1 and macOS 13.3.1. Please note that updates are also available for iOS 15 and macOS 11 and 12.
Could someone be viewing your private photos while your device is being repaired?
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
You shouldn’t put off updating to iOS 16.3 and macOS Ventura 13.2 and future updates, and here’s why.
We explain why it’s best not to use desktop versions of messengers such as WhatsApp, Telegram, Signal and the like.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
How authenticator apps work and what alternatives there are to Google Authenticator.
Here are a few tips on how to make your Untappd profile as private and secure as possible.
A few words about why Telegram isn’t as secure as its developers boast.