How can I help in securing your assets?
Reliable protection of your computers, personal gadgets, and networks on the every threat level – from technical to human. Providing your confidentiality on the Internet.
Verification of information
Checking your business partners and competitors with two-factor technique of information-psychological analysis. Assessment of information credibility.
Risk assessment and threat modeling
Acute and high-qualified assessment of your systems’ vulnerabilities on the technical and human level and elaborating strong methods of protection.
Recovering reputation after information attacks and negative media campaigns. Preventive creation of bulletproof reputation to resist such attacks. Working with public opinion.
Who owns information, he owns the world (N.Rothschilds)
that definitely will assist you
This story happened to me a few years ago. I was really angry and indignant when discovered that one of my feature articles was stolen and published under a false name on a website. Fortunately, the website had very detailed […]
If the headline above frightened or at least alarmed you, that means you really can fall prey of this cybercrime. Because it is a bit different from others. While the perpetrators usually aim at a vulnerability of your PC, this […]
The best way to defend yourself against the criminal mind is to try and get inside it. This is not without hazards of course, because you don’t want to end up becoming a criminal yourself! Social engineering is a particularly […]
In late June this year, a huge malware cyberattack paralyzed Ukrainian government and private computer networks, before spreading across the globe. Now, Ukrainian MPs have adopted an important law aimed at strengthening state policy on cybersecurity. Here to talk about […]
My video courses
- Serious Exchange Flaw Still Plagues 350K ServersThe Microsoft Exchange vulnerability was patched in February and has been targeted by several threat groups.Lindsey O'Donnell
- xHelper: The Russian Nesting Doll of Android MalwareUltimately delivering the Triada payload, xHelper goes to great lengths to become virtually indestructible once installed on a smartphone.Tara Seals
- FIN6 and TrickBot Combine Forces in ‘Anchor’ AttacksFIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.Lindsey O'Donnell
- Official Government COVID-19 Apps Hide a Raft of ThreatsAndroid apps launched for citizens in Iran, Colombia and Italy offer cyberattackers new attack vectors.Elizabeth Montalbano
- A Brisk Private Trade in Zero-Days Widens Their UseMore zero-day exploits coming up for sale by NSO Group and others is democratizing the attack vector and placing them within reach of less sophisticated attackers.Tara Seals
- Twitter warns users – Firefox might retain private messages 07.04.2020Whose fault was it - Twitter or Firefox? (It's fixed now, to be clear.)Paul Ducklin
- Two schoolkids sue Google for collecting biometrics 07.04.2020The suit is about biometrics and children's privacy in Google's education apps, which are suddenly, wildly popular now due to COVID-19.Lisa Vaas
- Thousands of Android apps contain undocumented backdoors, study finds 07.04.2020A study has found that thousands of legitimate Android apps are taking liberties or installing with capabilities that users wouldn’t expect to exist.John E Dunn
- Will Apple’s “microphone switch” stop your iPad getting bugged? 06.04.2020A microphone switch! What will they think of next?Paul Ducklin