how various methods of biometric authentication work
HOT
PUBLISHED BY ANA DASCALESCU SLOW READ

Biometric Authentication Overview, Advantages & Disadvantages

How popular biometric methods work, and how to hack them

What is biometric authentication?

Biometric authentication is simply the process of verifying your identity using your measurements or other unique characteristics of your body, then logging you in a service, an app, a device and so on. What’s complicated is the technology behind it, so let’s see how it works.

Doxxers want to find out your deepest secrets
HOT
PUBLISHED BY ANA DASCALESCU SLOW READ

Doxxing Can Ruin Your life. Here’s How (You Can Avoid It)

Learn how to avoid someone revealing your most personal information
HOT
PUBLISHED BY IOANA RIJNETU QUICK READ

Security Alert: New Wave of Malicious Exploit Kits Are Targeting Microsoft Office

Don’t click or download something that looks suspicious.
POLL OF THE WEEK
How often do you change your passwords?
weekly-security-roundup
RECENT
PUBLISHED BY IOANA RIJNETU 2018.01.12

Weekly Security Roundup

The most important cyber security news of the week, hand-picked and summed up

This week we’ve updated our guide with all the essential security blogs and websites you may want to follow and dive deep into the world of cyber security. You will find plenty of inspiring resources, from small to big blogs and websites, to independent researchers and experts, big names, media publications or security vendors to help you keep up to date with all the cyber security news.

We also wrote an in-depth article on biometric authentication, and everything you need to know about this technology. If you’re planning on purchasing an iPhone or other device with facial recognition, this blog post will come in handy.

RECENT
PUBLISHED BY IOANA RIJNETU 2017.12.21

Security Alert: Emotet Trojan Returns with New Waves of Spam Campaigns

Here’s how banking trojans target users’ admin rights on PC
RECENT
PUBLISHED BY IOANA RIJNETU 2017.12.18

13 Warning Signs that Your Computer is Malware-Infected [Updated 2018]

Watch out for these malware-infection signs!
Adobe Flash vulnerabilities
RECENT
PUBLISHED BY ANA DASCALESCU 2017.12.14

How Flash Vulnerabilities Expose You To Attacks

It’s time you learnt how to live without Flash and its security risks