News & events

Weak passwords means weak security

March 21, 2017

Passwords are the most common form of authentication used to control access to information because they are simple, inexpensive, and convenient mechanisms to use and implement. At the same time, passwords are also recognised as being an extremely poor form of protection. There are over 10 million username/password pair attacks …
Read more

SHA-1 function successful attacked

March 08, 2017

On February 23rd, a joint team from the Dutch CWI University and Google announced that they had generated the first ever collision in the SHA-1 cryptographic hashing algorithm. This industry standard is used in digital signatures and for file integrity verification, which secure credit card transactions, electronic documents. Another application …
Read more

Support of JAVA and ActiveX stops

October 19, 2016

As we mentioned last year,¬†well-known plugins such as JAVA will soon stop working in browsers. JAVA, ActiveX, embedded Flash, Silverlight and other plugin based technologies have been victims of some of the largest security threats on the internet in the last few years.(1)¬†Some reports are even stating that JAVA is …
Read more

Alternative JAVA solutions with mobile apps

April 05, 2016

As we mentioned last year, well-known plugins such as JAVA will soon stop working in browsers. JAVA, embedded Flash, Silverlight and other plugin based technologies have been victims of some of the largest security threats on the internet in the last few years.(1)An example of the area in which JAVA …
Read more