Security in connected things. Are the IoT users protected enough?

October 18, 2021 0 Comments

IoT Security. Problem statement. ​​Due to the rapid development of IT relationships and the use of smart devices, all the time affecting new objects of civil circulation of a legal nature, which is not always clear. These views on the uncertainty and unresolved nature of certain relations depend on the legislation and technologies of protection …

IS security. What do you need to know?

October 18, 2021 0 Comments

Informational security. Does the IS Policy work in your company? ​​Information security in the company is a very important element of any business. What do we know about it, what tools do we use to achieve it and are there enough of them? What is the Company’s Information Security Policy? Information security policy is a …

Getting Started with SQL Injection

computer security
April 27, 2021 0 Comments

SQL injection (SQL injection, SQLi, SQL injection) is often called the most common method of attacks on websites.

Hackers set up a SecuriElite shell company

Hackers set up a SecuriElite
April 3, 2021 0 Comments

In January 2021, Google Threat Analysis Group (TAG) experts spoke about the attack on IT security researchers around the world. Some details of this unusual operation have now been published.

People, processes, technologists

computer security
March 11, 2021 0 Comments

The digitalization of manufacturing has led to the emergence of new threats to the smooth operation of enterprises.

About hidden networks and the anonymity of their developers

and the anonymity of their
January 2, 2021 0 Comments

Totalitarianism and dictatorship took place in any historical period that modern science knows about.

How hackers rob banks

how hackers rob
October 25, 2020 0 Comments

Remember those epic robbery movies? Where tough guys come up with an ingenious plan, change their looks more often than models in shows, use incredible (unrealizable) psychological tricks and risk their skin in pursuit of profit.

Intelligence with geo2ip and reverse-whois

computersecurity
October 6, 2020 0 Comments

The reconnaissance of the company’s network resources mainly consists in brute-force subdomains with the subsequent resolution of the found network blocks.

Anonymity in the modern metropolis

A modern metropolis
October 4, 2020 0 Comments

A modern metropolis is a gigantic and complex organism, permeated through and through by information flows.

How cloud technologies are changing the world

How cloud technologies
September 30, 2020 0 Comments

Predicting the future is a thankless task: they say that only Nostradamus and one blind Bulgarian old woman succeeded in this.