How can I help in securing your assets?
Reliable protection of your computers, personal gadgets, and networks on the every threat level – from technical to human. Providing your confidentiality on the Internet.
Verification of information
Checking your business partners and competitors with two-factor technique of information-psychological analysis. Assessment of information credibility.
Risk assessment and threat modeling
Acute and high-qualified assessment of your systems’ vulnerabilities on the technical and human level and elaborating strong methods of protection.
Recovering reputation after information attacks and negative media campaigns. Preventive creation of bulletproof reputation to resist such attacks. Working with public opinion.
Who owns information, he owns the world (N.Rothschilds)
that definitely will assist you
This story happened to me a few years ago. I was really angry and indignant when discovered that one of my feature articles was stolen and published under a false name on a website. Fortunately, the website had very detailed […]
If the headline above frightened or at least alarmed you, that means you really can fall prey of this cybercrime. Because it is a bit different from others. While the perpetrators usually aim at a vulnerability of your PC, this […]
The best way to defend yourself against the criminal mind is to try and get inside it. This is not without hazards of course, because you don’t want to end up becoming a criminal yourself! Social engineering is a particularly […]
In late June this year, a huge malware cyberattack paralyzed Ukrainian government and private computer networks, before spreading across the globe. Now, Ukrainian MPs have adopted an important law aimed at strengthening state policy on cybersecurity. Here to talk about […]
My video courses
Grab at Packt Publishing
- Cisco Warns of High-Severity Bug in Small Business Switch LineupA high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.Lindsey O'Donnell
- Alina Point-of-Sale Malware Spotted in Ongoing CampaignThe malware is using DNS tunneling to exfiltrate payment-card data.Tara Seals
- EvilQuest: Inside A ‘New Class’ of Mac MalwareMac expert Thomas Reed discusses how EvilQuest is ushering in a new class of Mac malware.Lindsey O'Donnell
- New Android Spyware Tools Emerge in Widespread Surveillance CampaignNever-before-seen Android spyware tools have been used in a widespread APT campaign to spy on the Uyghur ethnic minority group - since 2013.Lindsey O'Donnell
- Email Sender Identity is Key to Solving the Phishing CrisisAlmost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.Pat Cooper
- Microsoft issues critical fixes for booby-trapped images – update now! 01.07.2020Booby-trapped images could be used to attack Windows 10 and Windows Server 2019 - update now!Paul Ducklin
- Google stops pushing scam ads on Americans searching for how to vote 01.07.2020No US entity charges citizens for registering to vote, but plenty of Google ads were happy to do so - and to grab your PII in the process.Lisa Vaas
- Firefox 78 is out – with a mysteriously empty list of security fixes 01.07.2020TLS 1.0 and TLS 1.1 are now considered security risks and blocked by default.Paul Ducklin
- Google joins Apple in limiting web certificates to one year 30.06.2020Is it fair to expect everyone to renew all their web certificates every year? Apple says yes, and now Google does too.Paul Ducklin