Submit your search
2022-11-27
Shamir's Secret Sharing Scheme

Shamir's Secret Sharing (SSS) is an efficient secret sharing algorithm for distributing private information (the "secret") in such a way that no individual holds intelligible information about the secret. To achieve this, the secret is converted into parts (the "shares") from which the secret can be reassembled when a sufficient number of shares are combined […]

Read More
2022-11-26
How to Install and Configure OSSEC on Ubuntu Linux

OSSEC is an open source host-based intrusion detection system that can be used to keep track of servers activity. It supports most operating systems such as Linux, FreeBSD, OpenBSD, Windows, Solaris and much more. It is used to monitor one server or multiple servers in server/agent mode and give you a real-time view into what’s […]

Read More
2022-11-16
The quieter you become, the more you are able to hear - part 1

Intro In the last few months, we've detected an increase of new strategies used by malicious attackers. Unfortunately, they were successful in draining a lot of crypto wallets - stealing more than $1 million worth in different cryptocurrencies. After we realized that multiple victims were unable to recognize new attack methods as malicious, we've begun […]

Read More
2022-11-12
The most common NFT scams

With the NFT euphoria, it’s no surprise that scammers are on the hunt for a paycheck. The good news is that knowing the most frequent NFT scams can help you stay a step ahead of fraudsters. Follow along as we explore the most common schemes you need to know about. Here’s a list of the […]

Read More
2022-11-04
Important! 5 ways to backup WebAuth private key

In this guide we will introduce you to private keys, their importance inside a cryptocurrency wallet and the reasons why you must back them up securely. We will also be making a recommendation on where to safely store your private keys. Important: If you lose your private key, you will be unable to recover it, […]

Read More
2022-11-04
What is SIM swapping?

SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your account. SIM swapping happens when scammers contact your mobile provider and trick them into activating a SIM card that the fraudsters have. Once this occurs, the scammers have control over your […]

Read More
1 7 8 9 10 11 18

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram