We have investigated a scam discount portal
Customers are facing another threat. After the fraudulent e-shops that David recently wrote about, this time fake coupon sites are trying to fool them. They promise up to 40% savings after registration or cashback on purchases in certain categories. In reality, however, they want the…
Step by Step: How to Recognise a Fake E-shop?
Internet fraudsters are getting increasingly sophisticated, as evidenced by networks of fake e-shops that have been created throughout the past year. After-Christmas sales attract you to a quick buy for little money. However, it’s important to know the sites from which we buy and if…
Free Wifi Doesn’t Always Have To Be Free
In the current holiday period, you’re more than likely to encounter the need to check your social networks, latest news or weather, when traveling to new destinations. And since you don’t want to find a monstrous amount for roaming data in your mobile phone bill,…
Secured Cryptocurrencies – 7 Tips for a Better Sleep
Blockchain-based technologies and cryptocurrencies as such promise you maximum security. But over the last few years, I’ve read hundreds of reports about investors who have lost their crypto savings for various reasons. Whether it’s improper private key retention, stock market hacking or phishing, there are…
Best-known Methodologies for Threat Modelling
In the last blog, we wrote about modeling and why it’s used by all tech giants. But do you need it, too? According to a study conducted at the University of Maryland, a hacker attack occurs every 39 seconds, with almost half of the cyber…
Good analysis is the basis of a secure application
You have the idea or customer requirements for the app on paper. You know roughly what it should do, what it should look like and you’ve also chosen the technologies. Now it’s time for analysis. What to start with, how to proceed and what to…
Experienced Programmer Security Checklist
When we were planning our latest event, Frontend masters vol. 21, we were most excited about the idea that it would finally be live again. Streaming is great, but it can’t beat real interaction with real people and fresh sandwiches. It gave us the opportunity…
The greatest value of any eshop is customer data
Do you know Shoptet? The platform with the motto E-shop in a few clicks offers quick solutions for creating online stores and in our opinion, it’s currently one of the best products of this type on the Slovak and Czech markets. For some types of…
The (not so) Safe Glossary
Our media regularly draw attention to various Internet threats – mostly at the initiative of the National Security Authority, which monitors and detects possible dangers and informs the public about them. However, these messages are pointless if the audience doesn’t understand them. That’s why we’ve…
12 Safety Rules of Internet Use
It never hurts to repeat the basics. Each of us has at least one person in the family who regularly contacts us with a request to rid their computer of viruses, because, in a better case, “windows pop up everywhere”, in a worse case the…