Loop of Confidence

With the arrival of Apple Pay and Samsung Pay in Russia, many are wondering just how secure these payment systems are, and how popular they are likely to become. In our opinion, these technologies require a more detailed examination and a separate evaluation of the threats they face. Read Full Article

Future attack scenarios against ATM authentication systems

The report comprises two papers in which we analyze all existing methods of authentication used in ATMs and those expected to be used in the near future, including: contactless authentication through NFC, one-time password authentication and biometric authentication systems, as well as potential vectors of attacks using malware, through to network attacks and attacks on hardware components. Read Full Article

Small users in a big network

In this article, we analyze statistics for visits by children to websites belonging to categories of undesirable content, as defined in the Parental Control module. These statistics allow us to estimate which categories of undesirable websites children visit most often. Read Full Article

CODE BLUE in Tokyo

On February 17th (MON) – 18th (TUE), 2014 we were at an event in Tokyo called “CODE BLUE”, a new international information security conference originating from Japan. Even though this conference was being held for the first time, no less than… Read Full Article