How to maximize anonymity when accessing the Internet on mobile

The problem of mobile anonymity Dystopia is in full swing in Europe, and achieving true anonymity from mobile devices is a big problem. The picture below shows that most countries require mandatory registration of SIM cards on the national ID or passport. This means that all mobile operators in a given state (and, of course, […]
Possibility of widespread leak and misuse of EU vaccination certificates
How to get an EU vaccination card for any citizen of the Slovak Republic based on their name and date of birth 1 Vulnerability history Similar to our recent revealed vulnerability in the NCZI systems (NCZI or NHIC National Health Information Center), where we were able to download 130 000 PCR/antigen tests and personal information […]
Mobile app security expert WANTED!

Job Description: Search for security vulnerabilities in Android/iOS apps and in the most diverse web applications and web services. Testing of mobile applications involves detailed testing of mobile applications and relevant web services in accordance with the OWASP Mobile Security Testing Guide. The result of the testing is documented by creating a final report in […]
Threat Hunting and Threat Intelligence services

Watch a video and read our comprehensive answers: Describe what Threat Hunting means and why it can be helpful for companies? On average, adversaries are present within an organization for more than 140 days before they are detected, and it often takes weeks and even months to entirely remove them. The time during which an […]
RED TEAMING – CAN YOU WITHSTAND A PROFESSIONALLY LED ATTACK?

1 WHAT IS RED TEAMING? In the following article, we will explain exactly what “Red Teaming” means, how it differs from traditional penetration tests, how the “Red Teaming” approach is unique, and why it best simulates a real coordinated attack. In Nethemba, we performed “Red Teaming” for many years before the term was publicly adopted […]
Our customer guide III

This is the third part of the article Our customer guide I and Our customer guide II. Repeated tests and bug bounty program The results of the performed penetration test or security audit are valid only to the specific date when the customer receives the final report. Neither we nor any other IT security company in […]
Our customer guide II

This is the second part of the article Our customer guide I. I want an offer, what do you need from me? (RFP) If you already know exactly which penetration tests or security audits you are interested in, do not hesitate to contact us. You can also do this in a secure encrypted way – […]
Our customer guide I

Everything you wanted to know about our IT security services The goal of the following document is to explain how to choose a suitable penetration test or security audit according to your expectations, following professional standards and at the best price. It is based on our 14 years of experience in the field of ethical […]
Interview with GPT-3 about IT security and privacy
You are an ethical hacker. You are doing penetration tests and security audits. You know how to test the security of web and mobile applications for vulnerabilities. If you find any, you report them to the appropriate people so that they may be fixed. Although penetration testing can be lucrative, it is not without its […]
We support the fight against COVID-19
Unfortunately, hackers do not choose the “right time” to attack. We can see aggressive hacking attacks on hospitals (Coronavirus test results delayed by a cyber attack at the University Hospital Brno) or the US Health and Human Services System (Hackers Attack Health and Human Services Computer System, Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak).The […]