Filters
Authenticator Pro: review of two-factor authentication app for Android
"There are quite a few apps for two-factor authentication. The most popular one, Google Authenticator,...
1 week agoPavel Belousov, Nadiyno.org: Basic rules of digital hygiene for your safety
Pavel Belousov, tech lead for the Nadiyno.org digital help hotline, gives recommendations on how to...
3 months agoHow to strengthen the protection of company information resources and employee accounts?
Reliable cybersecurity is a task for everyone, not just government agencies. Evgeniy Briksin from CERT-UA...
3 months agoCan hackers access your messengers?
If your device doesn't have a password or two-factor authentication, attackers can access messengers, including...
3 months agoMulti-factor authentication to protect your accounts
Digital security course: how to use MFA, why is it needed
3 months agoSafe Mode: How to Protect Your Communications
If you live in Russia, you've probably been hacked at least once — or at...
3 months agoDEGUGLIZATION. Replace services with more confidential ones
"User data is a precious resource that all major IT companies dream of getting their...
3 months agoHow to Protect Your Data | A Guide to Security Basics
In today's world, your data is the new oil, and cyberspace has become a battlefield....
3 months agoHow to restore Microsoft Authenticator codes on another device
"What do you do if you've lost your phone, had your phone stolen, or just...
3 months agoHow to recover codes from Google Authenticator on another phone
"Two-factor authentication should be enabled on all sensitive accounts - it's the law. One of...
3 months agoWhat to do if Your Telegram is Hacked?
"Has your Telegram been hacked? Don't panic! In this video, we'll tell you what to...
3 months agoAre Passwords Out of Date? Let's Talk Authentication
"Passwords are no longer considered reliable protection. Samat Galimov and information security expert Karim Valiev...
6 months agoCybersecurity cert prep: Lab 16 (Auth) — bypass MFA and save sessions using Python requests
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...