Filters
Authenticator Pro: review of two-factor authentication app for Android
There are quite a few apps for two-factor authentication. The most popular one, Google Authenticator,...
1 month agoSafe Mode: How to Protect Your Communications
If you live in Russia, you've probably been hacked at least once — or at...
1 month agoHow to recover codes from Google Authenticator on another phone
Two-factor authentication should be enabled on all sensitive accounts - it's the law. One of...
2 months agoPavel Belousov, Nadiyno.org: Basic rules of digital hygiene for your safety
Pavel Belousov, tech lead for the Nadiyno.org digital help hotline, gives recommendations on how to...
5 months agoHow to strengthen the protection of company information resources and employee accounts?
Reliable cybersecurity is a task for everyone, not just government agencies. Evgeniy Briksin from CERT-UA...
5 months agoCan hackers access your messengers?
If your device doesn't have a password or two-factor authentication, attackers can access messengers, including...
5 months agoMulti-factor authentication to protect your accounts
Digital security course: how to use MFA, why is it needed
5 months agoDEGUGLIZATION. Replace services with more confidential ones
User data is a precious resource that all major IT companies dream of getting their...
5 months agoHow to Protect Your Data | A Guide to Security Basics
In today's world, your data is the new oil, and cyberspace has become a battlefield....
5 months agoHow to restore Microsoft Authenticator codes on another device
What do you do if you've lost your phone, had your phone stolen, or just...
5 months agoWhat to do if Your Telegram is Hacked?
Has your Telegram been hacked? Don't panic! In this video, we'll tell you what to...
5 months agoAre Passwords Out of Date? Let's Talk Authentication
Passwords are no longer considered reliable protection. Samat Galimov and information security expert Karim Valiev...
7 months agoCybersecurity cert prep: Lab 16 (Auth) — bypass MFA and save sessions using Python requests
Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...