Did you know that your computer password isn’t a secret for me?

Did you know that your computer password isn’t a secret for me? Did you know that when you are at lunch, I can see your messages, photos and browser history? Who am I? I’m not even a hacker  I could be your colleague, or just share an office space with you, or be a security officer at your company, or an…

From Rubens to RSA. Evolution of Physical and Digital Keys

Cybersecurity Wearables. The Evolution of the Form Factor. Part 2: From Physical to Digital Keys Offensive security is the oldest and most effective. We saw it in the hominid with a stick example from the previous post. However, “offensive” means gear, human resources and brings along with it, an increased risk of counterattack. That’s why some time after the stick…

How Did a Wristwatch and a Scabbard Influence Cybersecurity?

Cybersecurity Wearables. The Evolution of the Form Factor. Part 1 Several hundred thousand years ago, an ape learned about carrying around a stick to protect himself and his family from predators and rivals. Then one day he tied the stick to his body with a piece of twine. This device left his hands free of the stick while it hung…

Backup Security: How Safe Is Your Backup?

Safe Backup Cover

Backup Security: How Safe Is Your Backup? And How to Make Sure It Actually Backs You Up. The airplane is slowly taxiing on the runway to the takeoff. You look at the airport through the window, relax in the seat and place your laptop in the forward compartment. The flight attendant gently taps your shoulder to check whether you are…

The Afterlife of Devices

How You Can Improve Your Device Authentication and Avoid Trouble After Your Personal Device Is Lost

How You Can Improve Your Device Authentication and Avoid Trouble After Your Personal Device Is Lost? What if it gets lost or stolen? This is the question we usually ask ourselves when buying a smartphone or tablet. We should also ask this question every time we install a banking app, set up corporate email on mobile or text our loved…

Hardware Authentication. A Year in Retrospective

Key achievements in challenges in authentication hardware in 2016 and challenges of the coming 2017

Government-sponsored hacking reached absolutely new heights this year, overshadowing even major corporate hacks. Therefore, the public and experts started looking for solutions. This led to increased media attention to emerging forms of reliable end user authentication, including hardware-based wearable solutions. Then investors and corporate roadmaps also reacted, directing their attention to the hardware authentication market.

What is Wrong With the Browser Passwords?

What is Wrong With the Browser Passwords?

Internet browser is the most used computer software. Besides browsing, we are increasingly using it for video chatting, creating spreadsheets and even brewing tea or watering gardensSince late 1990-ies browsers are kindly asking if we would like them to save our passwords. However, is this option safe? Winston Churchill once compared trusting passwords to your browser to having unprotected sex with a stranger. It is fun, yet you never know what you might end up with…