
Cyber Security Blog

Too Much Security — Revolut’s Case
Human factor in security needs to be balanced. Never removed but also not overused. In this article we’ll look closer at Revolut
Latest Articles

Android and iPhone Saving Your Data?
We are not Android fanboys to any degree. We feel a genuine concern over the fact that Apple devices share the “keyCode” of every pressed

Data Breaches and Safety Issues
Data is the new oil, so data breaches scare us, right? But it is even worse. From time to time, the media are shocked by

Costs of Downtime of Servers
The actual/tremendous costs of downtime Availability and reliability of services are crucial to keeping not only the financial part of the business together, but often

Business Security Concerns and Hacking Stats
Still 29% of workforce logs in from remote locations. Security gaps are visible from space! With so many messages, emails and digital forms of communications

What is Phishing Attack
Phishing is a social-engineered type of attack, where bad actors use fake messages delivered using e-mail, text message, or phone imposing legit sender, in order

How to Spy on People on iOS
Did you know that stealing personal details from websites – using keyloggers – is easier on iOS than Android? Our latest research around the topic

Top 200 Most Common Password List 2022
How secure are commonly used passwords?NordPass has compiled a list of the most popular passwords used in the internet. Examples:“abc123” less than1 second;“Liman1000” requires 3

We Turned Down €3M Buyout to Build a Cybersec of the Future
We said NO to buyout – and we are fundraising (seed)!We are creating A-Irene – https://a-irene.com/Our mission is to enable cybersecurity on websites and servers with

We are on a Mission
We are on a mission to make cybersecurity available for everyone!With Anomaly Detection, Telemetry and Behavioural Analysis. Our new website has launched: https://a-irene.com/

Demystifying the 409 HTTP Error: Conflict
While browsing the web, you may encounter various HTTP error codes, and one of these is the “409 Conflict” error. In this article, we’ll explore

Uncovering the 408 HTTP Error: Request Timeout
While surfing the web, you may occasionally encounter various HTTP error codes, and one of these is the “408 Request Timeout” error. In this article,

Deciphering the 407 HTTP Error: Proxy Authentication Required
While traversing the digital landscape, you may stumble upon various HTTP error codes, and one that occasionally surfaces is the “407 Proxy Authentication Required” error.

Demystifying the 406 HTTP Error: Not Acceptable
When surfing the internet, you may occasionally encounter a variety of HTTP error codes, and one of these is the “406 Not Acceptable” error. In

Decoding the 405 HTTP Error: Causes, Occurrence, and Solutions
The internet is an intricate web of information, and while browsing, you may have come across various HTTP error codes. One of these is the

Demystifying the 404 HTTP Error: What It Is and How to Handle It
Have you ever stumbled upon a web page only to be greeted by a cryptic message saying, “404 Error – Page Not Found”? If you’re
Editor's Pick
24/7 Monitoring Services
What Do You Get?
- Instant alerts – when your servers are down
- Traffic analysis – good vs bad (bots, crawlers etc.)
- Smart insights and analytics about your audience
- Regular Cybersec audits of your website
- Weekly email summary about your traffic and servers
- no credit cards required to become a free-tier user