The World Password Day - EBOOK TO READ! For many years, at the beginning of May, we celebrate World Password Day. Passwords are crucial to our daily lives. They protect our personal and sensitive information from prying eyes and malicious intent! Maintaining all our passwords is becoming more challenging with the increasing...
Ethical implications of cybersecurity
Ethical implications of cybersecurity As our lives become more and more digital, the importance of cybersecurity continues to grow, and ethical implications also need to be considered, such as: Privacy: Cybersecurity mechanisms can help protect against attacks but can also violate individuals' privacy rights. For example, government surveillance programs monitor...
SPIREE Cheat Sheet – Part 3: Detecting Data Breaches and Leaks
SPIREE Cheat Sheet - Part 3: Detecting Data Breaches and Leaks How can I check if my data has been stolen? There are a few simple ways to do this that we want to show you :) In the third part, we present four tools useful in detecting data breaches...
SPIREE Cheat Sheet – Part 2: Threat Intelligence Tools
SPIREE Cheat Sheet - - Part 2: Threat Intelligence Tools Second material from our new series of SPIREE Cheat Sheets!In this part, we present four tools that help in threat intelligence, thereto threat analysis based on information collected from various sources:Shodan (https://www.shodan.io/) is used to search for devices connected to...
SPIREE Cheat Sheet – Part 1: Malware Analysis Tools
SPIREE Cheat Sheet - Part 1: Malware Analysis Tools Today we start a new series of SPIREE Cheat Sheets! How you can analyze Malware - we present four tools for this: VirusTotal (https://www.virustotal.com) is a free service that allows you to verify a file, link, IP, or hash. A very...
Can I feel secure being „in the clouds”?
Can I feel secure being "in the clouds"? The cloud and technologies related to it are everywhere in our everyday life - Uber, Pyszne.pl, Gmail, Netflix, etc. All these services have one thing in common - the cloud. Using cloud solutions does not mean buying services in AWS, GCP, or...
(Cyber)safe love
(Cyber)safe love What do love and cybersecurity have in common? Let's consider erotic gadgets, and it turns out that quite a lot;) Almost every device must now be smart, e.g., have a dedicated application, location sharing, etc. This trend also applies to erotic gadgets. Producers of sex toys often do...