Security of our One-Time Codes | From Enigma to IoT #5
Published April 24, 2020
In this episode number #5 of the series on IoT security Jack Wolosewicz talks about ELIoT Pro’s security mechanisms that make it impossible to log on, even if somebody hijacks the sonic code, and how we use additional security mechanisms in our Human to Machine authentication component that prevent from impersonating the user. For Cyberus
MoreCyberus Labs selected by European Commission to secure world of IoT.
Published May 29, 2018
Press release Kraków, May 29th, 2018 Cyberus Labs introduces ELIoT Pro (Easy & Lightweight IoT Protector) – a game-changing end-to-end cybersecurity solution dedicated to all IoT networks and devices. ELIoT Pro is an extension of the existing Cyberus Labs’ user authentication system CYBERUS KEY that is the fundamental element for Human to Machine authentication and
MoreThe journey from Enigma to Cyberus Key
Published January 12, 2018
85 years ago, Polish mathematicians: Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the famous and considered to be unbreakable German Enigma cypher. It was Marian Rejewski who had deciphered the first message coded by Enigma on December 31st, 1932. But what Enigma and this episode has to do with Cyberus Key and cybersecurity of
More