Security of our One-Time Codes | From Enigma to IoT #5

Security of our One-Time Codes | From Enigma to IoT #5

Published April 24, 2020

In this episode number #5 of the series on IoT security Jack Wolosewicz talks about ELIoT Pro’s security mechanisms that make it impossible to log on, even if somebody hijacks the sonic code, and how we use additional security mechanisms in our Human to Machine authentication component that prevent from impersonating the user. For Cyberus

More
Cyberus Labs selected by European Commission to secure world of IoT.

Cyberus Labs selected by European Commission to secure world of IoT.

Published May 29, 2018

Press release Kraków, May 29th, 2018 Cyberus Labs introduces ELIoT Pro (Easy & Lightweight IoT Protector) – a game-changing end-to-end cybersecurity solution dedicated to all IoT networks and devices. ELIoT Pro is an extension of the existing Cyberus Labs’ user authentication system CYBERUS KEY that is the fundamental element for Human to Machine authentication and

More
The journey from Enigma to Cyberus Key

The journey from Enigma to Cyberus Key

Published January 12, 2018

85 years ago, Polish mathematicians: Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the famous and considered to be unbreakable German Enigma cypher. It was Marian Rejewski who had deciphered the first message coded by Enigma on December 31st, 1932. But what Enigma and this episode has to do with Cyberus Key and cybersecurity of

More