The classic CV template: how does it differ from the modern one and which is better?

The classic CV template shows you what the document looks like and what it should contain. It will also show you how it differs from a modern one, so you can find out which alternative is more suitable for you. We’ve put together basic information on each type of CV, along with samples and practical advice that will help you when you’re looking for a new job.

What is a classic CV?

The classic CV is the most common type of document you will come across. It is characterised by clarity, formality and simplicity. It only briefly lists information about you and your experience, rarely going into detail. Therefore, it is often accompanied by a cover or motivation letter in which you can elaborate on your qualities and experience.

Other features of the classic CV include its minimalist design. It is usually a white document with black font. You can use italics or bold to highlight certain sections or information. Alternatively, you can enlarge some words, but you shouldn’t use fancy fonts or different colours.

Sample of a classic CV

In order to make the classic CV easy to read and to prevent the information from blending together, it is divided into several basic parts:

  • Personal details – this includes your name, surname, address, phone number and email so that the prospective employer knows who the CV belongs to and can contact you if they are interested. Check this information carefully before sending the document.
  • Work experience – this section is for you to list all your previous jobs, in reverse chronological order. This means that you list your most recent job first. Each work experience should include the name of the company that employed you, your position, the length of time you were employed, and a brief description of your main responsibilities and functions. Remember that a traditional resume is meant to be rather brief, so include information in bullet points, not in long sentences and paragraphs. If you want to say more about the position, use a cover letter or mention the information at the interview.
  • Education – as well as work experience, education is listed in reverse chronological order. If you have a college degree, you list that first, followed by high school. Add the years of study and the degree earned to each item.
  • Skills – this section focuses on technical or personal skills such as computer skills, foreign languages, team leadership skills, etc. Only include skills that are relevant to the job and that you could use on your CV.
  • Hobbies and interests – this is an optional section that will give a potential employer a better insight into your personality. For example, you can list sporting activities, creative activities, volunteering, additional education (courses, workshops) or travel.
  • Other sections – if you need to, you can add other sections to your CV such as references, awards, certificates, etc. However, the more information you provide to a potential employer the better, but all information must be relevant. Avoid unnecessary details. Keep your CV short and to the point rather than full of irrelevant details.
Recommend
We recommend:

As most CVs are now electronic, you can add links to your website or LinkedIn profile where potential employers can find more information. For tips on how to fill out your LinkedIn profile correctly, see our article What is a LinkedIn profile?

Sample of a classic CV

sample of a classic CV

Advantages and disadvantages of a classic CV

The classic CV has several advantages and disadvantages that you should know about before you decide to use it.

Advantages of a classic CV

  • Clarity and simplicity – a classic CV is clear, making it very easy for a potential employer to find key information such as skills, work experience and so on.
  • Versatility – you can use this type of CV in almost any industry. Plus, if you’re sending it to multiple companies, it’s easy to edit because the information is listed in bullet points, not long paragraphs.
  • Easy to create – unlike a modern CV, you’ll have a classic one ready very quickly. However, take your time when writing it out and make sure all the information is correct.
  • Formality and professionalism – a classic CV looks professional, so it will represent you well.

Disadvantages of a classic CV

  • Lack of creativity – if you’re a creative person, the classic CV can limit you because it’s so simple and concise.
  • Less space for details – a traditional CV usually only includes the most important information. If you want to provide more detail, you’ll also need to attach a cover letter or send your portfolio.

When to choose a classic CV?

The classic type of CV should be chosen especially when:

  • you pride yourself on professionalism and formality,
  • you’re applying for a job in a traditional and conservative sector such as law, banking, government or academia,
  • you also send a cover letter or portfolio where the potential employer can find additional information,
  • you need to create a CV quickly and easily.

What is a modern CV?

A modern CV is a creative type of document that often uses a variety of graphic elements that can easily set you apart from other applicants. Another advantage of a modern CV is that, unlike a traditional CV, it contains detailed information about you, your experience, skills and hobbies, so there’s often no need to attach a cover letter or other supporting documents.

This type of CV is most often used in dynamic and creative fields where you need to stand out on first contact. It’s more difficult to prepare, but if you put the effort in, it can help you land your dream position.

Recommend
We recommend:

Although modern CVs allow for creativity, don’t go overboard. A document that is overly complicated, colourful or cluttered may not make a good impression on a potential employer.

Sample of a modern CV

A modern CV should have the same sections as a classic CV, namely:

  • personal data,
  • work experience,
  • Education,
  • skills and hobbies,
  • Interests,
  • other optional sections.

Don’t be be afraid to go in-depth when filling in your details. Write longer sentences and paragraphs, introduce projects you’ve worked on, courses you’ve taken, etc. Avoid being brief and short bullet points of information.

Sample of a modern CV

The modern CV includes the same sections as the classic

Advantages and disadvantages of the modern CV

Even a modern CV has its advantages and disadvantages:

Benefits of a modern CV

  • Creative and visually appealing design – a modern CV uses colours, graphs and other visual elements that can catch the employer’s eye and increase your chances of success.
  • Detailed information – you can include much more information in a modern CV than in a traditional one, which increases your chances of landing your dream job. There’s also the advantage that you often don’t need to attach a cover letter to a detailed CV.
  • Differentiation – you can customise your modern CV with different fonts and visuals to help you stand out from the crowd.
  • Flexibility of format – you can customize and organize the individual sections of your CV exactly as you like. They are not fixed as in a traditional CV.

Disadvantages of the modern CV

  • Less clarity – by being full of information, a CV can be less clear than a traditional CV. Therefore, make sure that the different sections are properly separated, for example by a heading in a larger or bold font.
  • Requires more time to prepare – it takes a lot of time to develop a modern CV. Set aside two or three hours, think about how it should look and write down all the necessary details.

When is a modern CV suitable?

A modern CV is suitable when:

  • you’re applying for a job in a creative industry such as marketing, design or the arts,
  • you want to impress and stand out,
  • you want to include details of your skills and experience on your CV.

Tips when choosing a CV

Once you have an idea of what a classic and modern CV looks like, you can move on to choosing one and then creating it. If you still don’t know which is best for you, answer the following questions:

  • What industry do you work in? If it’s marketing, art, fashion or advertising, a modern resume is the best choice. On the other hand, if you work in finance, banking or government, opt for a formal, or classic, CV.
  • What type of CV does the employer require? In some job adverts, you may find information about what kind of CV the employer requires. This will tell you whether a traditional or modern CV is more appropriate.
  • How do you want to present yourself? If you want to give the employer as much information as possible right from the start, choose the modern type. On the other hand, if you want to reveal more about yourself in a cover letter or interview, choose a brief, formal CV.
  • Are you sending just a CV or also a cover letter or portfolio? If you’re just sending a CV, the modern type is usually better because it contains more information. If you are also attaching a cover letter or portfolio, keep the CV short so that the information is not unnecessarily repetitive.

More practical advice on how to write a CV

Follow these tips when creating your CV:

  • The information on your CV must be accurate and truthful. Do not make anything up. Any lies will be exposed later and may cause you problems.
  • Be brief and to the point. Even a modern CV, which is more detailed than a traditional one, should not be 4 or 5 pages long.
  • Use the same style and formatting. Don’t change the font type or size to avoid chaos in the document.
  • You can add links to your portfolio or social networks such as LinkedIn to your online CV.
  • When writing, focus on the skills that are relevant to the position.
  • Avoid giving personal information that is not relevant. Focus primarily on skills and experience.

A classic and modern CV template to make your job search easier

Writing and sending out CVs is time-consuming. If you don’t want to start from scratch, try pre-made templates on the internet. The classic CV template is simple and can be completed in a few minutes. A modern CV template , on the other hand, gives you some idea of what it might look like, but doesn’t limit you in any way. It’s up to you how you customize it. Use our practical tips to impress your potential employer on first contact.

A sample reference letter from employer: how and when to include a job reference on a resume?

A reference sample from an employer can greatly help you in your job search. It will help you know what this type of output should look like, what should be in it and, conversely, what should definitely not be in it. In addition, we’ve prepared practical tips and advice in this article to help you avoid unnecessary mistakes and know who to ask for references.

What are references?

A reference (also a letter of recommendation) is an informal personal recommendation given to you, as a job applicant, by your former employers, clients or business partners. They are usually a summary of information about your work experience, skills, abilities and personal qualities that will help a potential employer to build a better picture of you and determine whether you are a suitable candidate for the job. A reference includes achievements you have made in a previous job or specific examples of how you have used your strengths. The person writing the reference may mention how well you solve problems, how you work in a team or how you bring interesting ideas to the table. Employer references usually include contact details of the writer so that the new employer can check the accuracy of the information or ask for further details. However, the contacting happens only in the last rounds of the recruitment process, when there are only a few candidates for the chosen job.

Recommend
We recommend:

References should always be truthful and up to date. You should also be able to explain why you have chosen this person to recommend you. In this case, it would be useful to mention that they taught you a lot in a previous job, for example, or that they are a role model for you. However, you should avoid mentioning personal friendships. A close friend or family member is not an ideal referee.

Reference types

Job recommendations can be divided into several types according to their form, formality, purpose and how they are delivered:

Written vs verbal recommendation

According to the form of the recommendation we distinguish:

  • Written form – a letter of recommendation or job evaluation from a previous employer describing the employee’s performance evaluation. They may be attached to a resume or requested by a new employer.
  • Verbal – a recommendation given in person or over the phone, e.g. by providing a phone number on a CV or cover letter (with the referee’s permission, of course). These are less formal and more flexible as the referee can respond to questions spontaneously.

Personal vs work references

Based on who writes and provides the recommendation, there are two basic types:

  • Personal references – written by your colleagues, or people who have worked with you but were not your supervisors, or people who otherwise supervised your performance such as teachers, coaches, mentors, etc. They focus mainly on personal qualities such as teamwork, relationship skills, communication skills or character.
  • Work references – these are references from an employer, client, business partner or someone who has been your supervisor in the past. These tend to include skills related to work ethic, meeting deadlines, team leadership or work performance.

Feel free to combine the references. However, it is the work references that are most relevant for a future employer.

On request vs proactively

Referees may provide their recommendations:

  • On request – that is, if you or your new employer asks them to do so.
  • Proactively – this is an initiative to provide a recommendation of the referee’s own volition, e.g. via the LinkedIn platform in the Recommendations section.

Work assessment vs reference

However, we can still look at references from former employers from an employment and formal point of view. In this division, we know two types of documents:

  • Work assessment – employer is required to provide this document at the employee’s request upon termination of employment. It is therefore a formal and regulated document governed by the Labour Code. Its exact form and content are not specified by the law. However, it should be an objective assessment of the former employee’s work. Together with the work assessment, an employment certificate is issued.
  • Employer reference – this is more of an informal, voluntary and may even be just a verbal (e.g. a phone call between employers) and subjective recommendation that an employer provides to an employee for their future employer.

However, both documents are important when looking for a new job because they tell about the employee’s work history and performance from the perspective of another manager.

Obligation to issue a work assessment and employment certificate

The employer is obliged, in accordance with the provision of § 75 paragraph 1 of the Slovak Labour Code, to issue a work assessment to the employee within 15 days of the employee’s request. The employee can request a work assessment at any time during the employment relationship. However, the employer is not obliged to issue a work assessment earlier than two months before the end of the employment relationship. The law defines a work assessment as: “all documents related to the evaluation of the employee’s work, his qualifications, abilities, and other facts related to the performance of work.” The employee has the right to inspect their personal file and make extracts, copies, and photocopies from it. However, the form, method of issuance, and content of the work assessment are not specified. The employer is also obliged to issue a certificate of employment to the employee upon termination of the employment relationship and to include in it:

  • the duration of the employment relationship,
  • the type of work carried out,
  • whether deductions are to be made from the employee’s wages, in whose favour, in what amount and in what order is the claim for which the deductions are to be made,
  • an indication of the employee’s commitment to remain in the employer’s employment for a specified period of time after passing the final examination, A-levels or graduation examination referred to in section 53(2), including an indication of when that period of time will end,
  • an indication of the provision of severance pay under section 76a; if severance pay has been paid retrospectively, the employer shall issue a new employment certificate to the employee.

However, if the employee disagrees with the work assessment or work certificate – and the employer has not modified or supplemented the assessment at the employee’s request – they may apply to the court for a reasonable modification of the assessment within 3 months from the date on which the employee became aware of the contents of the document. In such a case, the employer is obliged to modify the document. As regards other information about the employee, apart from the above, the employer is only entitled to provide this information with the employee’s consent.

LinkedIn references – online public evaluation of employees, employers, colleagues or business partners

References on the social network LinkedIn are a separate reference category. You can get these digital recommendations from your contacts – superiors, subordinates or clients. They have several advantages:

  • They are publicly available – LinkedIn references are available to anyone who visits your profile. People who wouldn’t otherwise have access to this information can read about your strengths.
  • Anyone can give them – anyone can give you a rating for your work on LinkedIn, from your colleagues and clients to your business partners and bosses.
  • Easy to fill – the LinkedIn reference template doesn’t have the same strict rules as regular references. All you have to do is write what you think the person’s strengths are and post the text.
  • You can have more of them on your profile – there’s no limit to the number of references you can have on LinkedIn. So you can accumulate dozens of them over the course of your career.
  • They are authentic – each reference includes the author’s name and a link to their profile. This makes it easy for a potential employer to see what position the person holds, what area they work in, etc.
  • They support your professionalism – LinkedIn references are just as important as traditional ones. They can confirm that you’re really good at what you do and have the skills you need.

Linked in referrals are digital recommendations you can get from your contacts

LinkedIn references - online public evaluation of employees, employers, colleagues or business partners

Why are references important? It’s not just about employee evaluation

References are important for several reasons. The main ones include:

  • Verifying your skills and experience – references help potential employers verify that the skills, abilities and work experience you’ve listed on your CV or cover letter are genuine.
  • Credibility – a well-crafted reference from your previous employer increases your credibility and gives you some confidence that you will be a good addition to the team.
  • A better view of your personality – a CV often just lists your strengths, skills and experience, but a well-written reference can show where and how you’ve used them. Thus, testimonials contain not only employee evaluations but also specific work results. A new employer will have a better idea of how you can lead a team, handle stressful situations or solve problems.
  • Comparing candidates more thoroughly – it is often the case in a selection process that some candidates have the same or similar skills. In order to decide which one is better, the employer often looks at references. These can reveal a lot of details about you, such as your performance ratings during crisis situations or your working behaviour in a team, e.g. towards colleagues or clients, and help you get your dream job.
  • Encouraging networking – this point is especially true in connection with references on LinkedIn. Good references can help you build valuable professional relationships and build your personal brand.

Where to put references?

You can provide references in a number of different ways, depending on what area you work in or who you’re applying to. Most often, they are included in the following documents:

  • CV – references should be listed in a separate section, which you label “References” or “Testimonials”. The advantage of this solution is that the employer has all the information in one document and does not have to click anywhere. On the other hand, a CV only provides limited space, so longer references are better put separately, for example in an attachment.
  • CV attachment – ideal if you have a longer reference or don’t want your CV to be several pages long. The attachment should be sent in PDF or Word format.
  • Portfolio/website – if you include your portfolio or website on your CV, you can include references here. The advantage is that they are authentic, as you can link directly to the employer’s website or a colleague’s LinkedIn profile, and they are easy to update.
  • Cover letter – you can include references in your cover letter. In this case, just briefly mention a recommendation from a supervisor or colleague. However, bear in mind that this is not common practice – references are more likely to appear on a CV or website.

When to include references on a CV?

You should include references in your CV in the following situations:

  • if a potential employer asks for it, for example by stating it in the advertisement,
  • if you already have some references and you think they could help you get your dream job,
  • if you want to impress your employer,
  • if you want your CV to be more credible,
  • if you have a vacancy on your CV and you want to fill it.

When not to provide references?

References are great and can help you, but they may not always be useful. For example:

  • you’re just starting out and you don’t have good references,
  • you don’t have a relevant reference from your employer,
  • the company does not require references at an early stage of the selection process,
  • references make a CV too long.
Recommend
We recommend:

References can help you, but don’t overdo it. Two or three good references are usually enough for an employer.

Who to ask for a reference?

Who you should ask for a recommendation depends primarily on whether you are a university student, a recent graduate or an experienced professional in the field.

  • If you are a student or recent graduate, ask for references from, for example, a teacher, professor, coach or part-time employer.
  • If you are an experienced professional in the field, a reference can be provided by a previous employer, supervisor or mentor.

Who definitely not to ask for a job reference?

You should never ask for references:

  • family members or very good and close friends who cannot be objective,
  • colleagues and superiors with whom you had some conflicts,
  • people who don’t know you well,
  • people who aren’t interested in providing a reference and you have to force them.

How to ask for a job reference?

If you want to ask someone for a reference, you should do so professionally and respectfully. The best way to do this is to follow this procedure:

  1. Choose the right person(s) – only ask for references from people who are relevant to you. A reference from someone who works in a completely different field will not be beneficial to a potential employer.
  2. Choose an appropriate method of communication – the best way to ask for a reference is a face-to-face meeting, email or phone call. Avoid contacting via social media as this comes across as unprofessional.
  3. Phrase your request – your request should be brief, concise and polite. Get straight to the point and remember to be polite. Explain thoroughly to the person what you need the reference for.
  4. Have patience – never get references at the last minute. Give the person who has to write it plenty of time. If they turn you down, respect their decision and don’t pressure them.
  5. Thank them for their helpfulness – whether or not the person has written you a reference, always thank them for their response.

Sample references and tips on how to include them in your CV

Employee reference evaluations do not have a precise template of what they should look like. However, they should include the following information:

  • the name of the person writing the reference,
  • the job the person holds,
  • the contact details of the person,
  • the text of the recommendation itself (strengths, skills, abilities, examples of specific achievements).

To make it easier to write references, we have prepared a handy sample of employer references. Download the Modern CV Samples – References.pdf.

How to write an employee evaluation from the perspective of an employer, manager, or colleague?

When a manager or colleague writes a reference for a former subordinate or colleague, they should follow a few basic rules to ensure that the reference is not only professional but also useful to the prospective employer. Here are a few recommendations:

  1. Introduction and context – the first part should briefly introduce your job position and relationship with the employee or colleague. This includes information about in what capacity you have worked with them, how long and in what context. Example:

“I worked with Jan Procesny during his five-year tenure in our company as a project manager. As his supervisor, I can attest to his high work commitment and professional approach in every area of his work.”

  1. Job skills and performance – this section should detail the job skills and qualities that the employee has achieved in this position. Try to be specific and provide examples that demonstrate the skills in question. You can include hardskills such as technical skills with various software, professional certifications, or language skills. Example:

“Jan has exceptional technical skills, particularly in project management and working with software tools such as Jira and Asana. In addition, he has an advanced level in Microsoft Excel and has frequently used advanced features such as contingency tables and macros to analyze and visualize data. Jan is also fluent in English and has a working knowledge of German, which has enabled him to work effectively with international clients.”

  1. Work ethic and personal qualities – in addition to professional skills, it is important to include the employee’s work ethic and personal qualities. Here you can list softskills such as punctuality, responsibility, flexibility or problem-solving skills. Example:

“Jan is characterized by excellent organizational skills, which was especially evident when managing complex projects with a large scope. Thanks to his attention to detail, we were able to meet challenging deadlines while ensuring high quality results. He was also an active team member, always willing to help his colleagues. Jan is very reliable and always came with a positive attitude, even in stressful situations. He has exceptional communication skills that allow him to communicate effectively with different teams and solve problems quickly and independently.”

  1. Final Recommendation – in the final section, make it clear whether you would recommend the person for the next position. Be positive and concise. You can also indicate in what areas you think they would be best suited. Example:

“Based on our cooperation, I am convinced that Jan Procesny will be an asset to any company looking for an experienced project manager with strong organizational skills and an eye for detail. I have no hesitation in recommending him.”

  1. Contact details – please provide your contact details at the end so that the new employer can verify the information or get more details if necessary.

A reference structured in this way is clear, positive and offers practical information that will help a prospective employer in their decision-making process.

Which work testimonials and references are correct?

Proper job references on a resume meet these parameters:

  1. They are written by a former employer, mentor, client, business partner, professor, teacher, or other person who has worked with you in the past.
  2. They can be verified by phone call or email.
  3. They shall contain all the particulars, including the name, surname and contact details of the person concerned.
  4. They inform you about relevant facts, i.e. your skills and abilities.
  5. They tend to be short and concise, not written in half a page or more.
  6. They are up-to-date, truthful, objective and positive.

Sample reference – ask for feedback and get the employer’s attention

A good reference should be written by someone who has worked with you longer and knows you
The reference should also include the contact information of the person writing it

An employer reference template is a practical solution if you want to make writing a reference and finding a job easier. Remember, however, that an employer reference is not the only type of document that needs to be of good quality and well crafted. In addition to it, you will need a detailed CV and, if the employer requires it, a cover letter in which you can elaborate on your experience and skills.

Podcast #2: AI and the future of IT work

In the second episode of the podcast Na Vlne Kodu, we welcome Michal Bystricky, who works as a data scientist at msg life Slovakia. He will tell us how he uses artificial intelligence in his work and how AI will affect the work of IT specialists in the future. We wish you a pleasant listening and reading.

Welcome to today’s Na Vlne Kodu podcast, brought to you by msg life Slovakia. In today’s episode we have prepared for you the topic of AI and the future of IT work. We’ll take a look at how artificial intelligence is changing the world of work, not just in IT, but in general. Our guest is Michal Bystricky, who is a great visionary and among other things, is involved in artificial intelligence (read also our article about what is artificial intelligence). Together, we’ll walk through how robots will interfere with our careers and maybe even our lunch breaks.

Na Vlne Kodu Podcast (in English “On the Wave of Code” podcast)

Podcast “Na Vlne Kodu”

‘Na Vlne Kodu’ (On the Wave of Code) is an IT podcast by msg life Slovakia. It regularly covers topics from the fields of psychology and HR, as well as IT news. Listen to more episodes of Na Vlne Kodu.

Michal, please introduce yourself.

Hello everyone, my name is Michal and I’ll take the opportunity to be introduced by AI. Hi, are you there?

“Hey, sure, I’m here. How can I help you?”

I’m in the podcast right now. Could you introduce me? Please try to introduce me in a way that’s emotional, with enthusiasm. And when you talk about programming, please be sad or breathless.

“Okay, let me try. This is Michal. A man with tremendous determination and passion for technology. He takes a deep breath. His journey has been fraught with obstacles, but he has never stopped believing in the power of artificial intelligence. He begins to speak sadly. And though he sometimes loses hope when programming, his belief in the positive impact of technology always drives him forward. It’s as if he’s out of breath.”

Okay, wait. Now tell me where I work and what I do, please.

“Michal works at msg as a data scientist. He is developing a system for searching large amounts of documents that can answer queries based on their content. With extensive experience in various roles including teacher, system administrator, developer and development manager, he decided to return to development after major events in the AI field.”

Okay, I’ll try to add a little bit more. I decided to go back to development precisely because for the first time ever we can have a whole robotics team working for us.

What’s the most specific thing you’ve managed to find so far? And have you always managed to find what you wanted?

These are those magical moments when we have multiple documents – for example, a technical manual, a sales report or a marketing document and each of them is thousands of pages long. In that document, we can find the one piece of information we need. And we can also find related information in all the documents, link them all together, reference them, and then provide a comprehensive answer.

How would you explain the concept of AI to someone who “is stuck” in the 80s – such as myself at times?

If you’re stuck in the 80s, you know that a computer is made up of transistors. They’re like those switches 0 or 1. You can make block of logic out of them, which is what a computer is actually made of. At that time, a personal computer was made up of about 10,000 transistors. We have managed to increase that number very much, by 2 to 3 million more. Just to give you an idea – for example, a graphics card in a computer has 76 billion transistors. Then we built thousands of these very powerful computers side by side and took text from all over the Internet. We then created a statistical system – programmers might be familiar with regression – and we told it to predict the next word. Well, then it started to make sense. Later, we made the system even bigger, and the AI started thinking.

AI and robots – are they basically the kind of future colleagues who never take holidays?

Those AI colleagues are no longer future, they are present. Up to 70% of my work is done by AI. That 30% is my work because I know the context better and have expertise that I’ve gained over decades. The core of my work is programming, but I don’t write much of that code anymore, I actually just query the AI. Besides, I’m learning Spanish with the AI too.

“Artificial intelligence does 70% of my work. Personally, I don’t write much code anymore, I actually just query the AI.”

But if we’re talking about humanoids, i.e. robots that have arms and legs and talk, we’re not there yet. The primary challenge in this area is how to scale that model down. For example, a language model that has 200 trillion parameters needs 120 GB of memory, which requires about 4-5 graphics cards. Each consumes approximately 350 W, 2 kW in non-stop operation. The price starts somewhere at 4 000 euros. And that’s just the language. Then you still need to talk, listen, move, etc. Humans are very efficient biological systems – you have your coffee and you’re ready to work. But the current robot models are very inefficient, they need a lot of energy.

AI can solve complicated problems in a very short moment. Does this mean more time for IT professionals to play games or further their education?

AI doesn’t bring more free time, but it allows us to solve routine tasks. We can focus more on, for example, architecting or strategizing, and we have the opportunity to build better systems. So today it’s more about how to use that free time to do other work.

‘AI enables us to automate routine tasks. This means we can use our free time to develop better systems.’

Do you see the future of IT professionals as AI-tuning engineers or as someone who will collect data for artificial intelligence?

One option that one can apply are those big generic models like chatGPT, timeGPT and others. These biggest ones, called foundation models, are being developed in America. I’d like to zoom in on why this is so far away from us – ordinary engineers. OpenAI has 100 thousand H100 graphics cards on which it trains. One graphics card costs EUR 30 000, so those graphics cards alone cost EUR 3 billion, and there is also all the infrastructure around that. So you need a lot of money for the current AIs. We, ordinary engineers, will be more concerned with operating or maintaining these machines.

If artificial intelligence can write code, can we make do with IT testers? Or will it be developers who will continually educate and improve AI?

There are many themes in maintenance or servicing, I would mention a few. For example, it can be that fine-tuning when we train a model for a specific use case. That’s where transfer learning happens, where we take a big model, add some layers to it, and then train just our layers. Then we can give that model various other ways of expressing itself in a customized way. Another big topic like that is prompt engineering – how we instruct that model to give us what we want. Another related thing is alignment – whether what that agent is doing is consistent with the social rules. There are programs like AutoGPT or OpenAI Swarm, that we use to create a team of agents that work for us. Nowadays it’s quite easy – you install Ollama in Python and write such agents in basic form in one day. The complexity, the variability in which the answer can be provided, is infinite. That’s where one will be able to apply oneself very well. And will therefore work together with AI.

Recommend
We recommend:

Read also: Artificial intelligence and programming: should you be worried about your job?

When you hear the term process automation, do you see boring, monotonous work or do you imagine a more sci-fi future full of lasers and robots?

Artificial intelligence and automation could lead to something similar to what we see in Star Trek. People there live in abundance, everyone’s basic needs are provided for. They are enabled by key technologies such as replicators that can create any object from anything. They eliminate scarcity, and therefore they don’t need money. They can extract energy from antimatter, so they have a lot of energy. And there are other technologies, for example, holodecks to simulate the environment. If we had such means, our view of the economy would change, because we would not be constrained by the scarcity of resources. The people in Star Trek are engaged in creative, innovative and community activities that make sense. Individuals don’t contribute to society for money, but for personal fulfilment, curiosity, and a desire to contribute to some common good. This idea is, however, rather utopian.

Do you think AI will be intelligent enough to penetrate even the deepest interiors of the human mind? What do you think about mind reading? I know we’ll cover this more in the next podcast because it’s such a wide topic, but for now, at least briefly.

I think so. There are two levels. If we’re talking on a normal human communication level, i.e. what tone I speak in, what facial expression I have and so on, the AI can already detect what emotion a person is having and react accordingly. If you then add the second level of penetrating thoughts, that’s really for a longer discussion. Do you know the Neuralink project? It is a device that is implanted in the brain and captures signals from the brain that go to the AI. The AI learns what those signals mean and the human can control the devices by thinking. Neuralink is already being tested on humans and it works.

You mentioned that AI has the ability to read our emotions. Do you think we should be afraid of AI in the future?

I don’t think so. AI brings us a lot of improvements, and it’s because of them that we can better focus on the goal and do what we really want to do. People are scared of change, but I think the change will be positive.

If AI can write code, does it make sense for programmers to still learn how to write code? That classic Hello World?

I think we still need to develop algorithmic thinking. We definitely need to learn how to code, how to program, how to define an algorithm, what has to happen step by step. Because that’s how we actually instruct AI. We also need to be innovative, creative and leadership and management is also important. To be able to navigate, at that developer level, one still needs to understand it. It’s less about math or low-level programming like that, but there are still tasks that AI can’t solve and the developer has to be able to navigate. So it’s about that high-level component composition, software design, architecture, etc.

‘Even in the age of AI, programmers need to develop an ability to think algorithmically, as well as being innovative and creative.’

You mentioned that AI can’t solve some tasks. Can you name a few activities that it keeps failing at?

I will try to give an example to illustrate the complexity. Imagine that we have three agents and each of them is different. They’re working on some kind of analysis, like data, sales, marketing – it doesn’t matter. Depending on how I set up each agent, that’s how I’m going to have the output. If I make any one member more strict, after a couple of hours of those agents working, the output will be more absolute. Modeling these dynamics is very complex. We’re not just talking about what members are going to be on the team, we’re also talking about what personalities they’re going to have. How they will express themselves, what visual skills they will have, for example, and so on.

At a time when artificial intelligence can analyze data faster than humans, will our main task be just cleaning up or checking up after robots?

When AI generates something, it doesn’t mean it’s correct. The prompt engineering, that is, generating input requests for AI, is not easy. Specifically in programming, when working with AI, it’s key to realize that AI doesn’t have the whole full context. I’d like to lay out my strategy, which gets me good results. My queries for AI are directed at small, bounded components with clearly defined interfaces. Ideally, I also provide some architecture for the AI to understand it even better. And by making it so small, bounded and clear, I get better quality and first time usable results. And that is because the AI gets clear boundaries within which it can work.

What skills should a person have to be irreplaceable in a future full of artificial intelligence? What will AI not replace?

I do think human and AI will live in symbiosis. The basic skill is to be able to use AI to create higher level goals. As I mentioned, in programming, it’s tools like AutoGPT or OpenAI Swarm, so programming multiple agents to work together to achieve a goal of some specialized nature. Thus, deep analysis, where each agent is tailored to some domain of its own and possibly fine-tuned. I think it will go in that direction.

As AI is being taught more and more, shouldn’t we, for example, start with teaching kindergarten children to be able to program some friendly AI algorithms? So that we can truly live in symbiosis with it?

That is a very good question. Education is extremely important. I went to mechatronics clubs when I was learning to program, and I experienced a lot of positive emotions there. Emotions are a powerful thing and I have been in IT for 20 years because of them. For me, it was that hard skill where I learned C, C++ and Linux. And similarly, if kids were taught AI ethics and programming, they would be very good, positive, morally and ethically aware people.

Recommend
We recommend:

Read also: Coding for kids: a game or preparation for an IT career?

Do you think robots should be equipped with some moral judgement? Or is it enough to teach them not to be “ogres”?

We train morale in AI in a number of ways. The first one is that humans provide different perspectives on moral dilemmas, and the AI learns to predict the next words accordingly. In the second step, the AI is confronted with moral dilemmas and has to decide what actions to take. When it takes a step, we show it how those choices affect individual characters and what impact they would have. There are some predefined ethical principles. If it makes the right choices, it gets feedback. We show the AI different approaches. I can mention, for example, welfare maximization. In the trolley problem, for example, I choose one person instead of three. Or rule-based ethics or focusing on the moral character of the decision maker. I would conclude that AI needs to be taught the way we teach our children.

“We need to teach AI in the same way that we teach children.”

Should we be more worried about AI replacing us or about relying on it too much? Apart from it having blackouts, aren´t we going to get lazy?

I do believe that people are inherently curious. We don’t get lazy. Rather, we will have to maintain knowledge at such a lower level of abstraction. And that’s where the interesting jobs might be. And as far as addiction goes, when I started programming around 2000, the Internet wasn’t that common yet. We had dial-up back then, and I used a manual to program in Basic. And then with DSL internet in 2003 came Google. I stuck with that until 2023, when I started using big language models, which means I automatically go for the AI now. When I was on an airplane, for example, and I didn’t have the ability to connect to a model, I found that I was actually already dependent on AI. But the positive thing is that with AI I’m two to six times faster than with Google, depending on the task.

‘Using AI, I’m two to six times faster than I am with Google.’

Can we ever teach AI to be human, or to have emotional intelligence? Or will it always just be programmed compassion?

I would answer you with a question: How do you know that AI has programmed compassion only? We too are shaped genetically by experience and some current chemical state. Perhaps the difference is only in how we perceive these processes. If AI exhibited high-level emotional intelligence, wouldn’t it be similar to how we learn to be empathetic through experience?

Could you summarize for us how IT people can adapt and collaborate with AI to create a symbiosis between the two?

Here I would like to mention the most prominent topic that is now coming up the most, which is multi-agent cooperation. Not just as collaboration, but their actual programming and modeling dynamics to achieve the desired goal. This is a big topic that is variable and complex. And this is where we can apply ourselves.

Thank you very much for bringing this interesting topic to my attention. I hope that we have helped you, dear listeners, to understand more this big topic of artificial intelligence. That it is not about robots trying to replace us, but that AI can become our best partner on the road to a more efficient future. Stay tuned and till the next episode of our Na Vlne Kodu podcast, goodbye!

Cyber attacks & cyber threats: types and prevention

In today’s digital era, where most of our personal and professional activities take place online, cyber attacks have become a serious threat to individuals, businesses and government institutions. Cybersecurity is therefore a key area dealing with the protection of systems, networks and data from unwanted attacks. Understanding what a cyber-attack is, how it takes place and what its most common forms are, is the first step towards being able to counter and effectively protect against these threats. This article will introduce you to the different types of cyber attacks and explain how they work.

Cyber attack definition

Cyber attacks are attempts to steal, alter, destroy, disrupt or render inoperable information resources and systems in computer networks and systems. Cyber attacks can be classified into two categories: internal threats or external threats. Internal threats result from individuals with legitimate access to the systems they target exploiting their access to intentionally or unintentionally exploit vulnerabilities. They can be carried out by a disgruntled or angry employee or contractor with access to the organisation’s systems. An external threat comes from someone who has no relationship to the system being attacked, such as a criminal organisation or hackers. Cyber attacks can target a wide range of victims, from individual users to businesses or even governments. In attacks on businesses or other organisations, the hacker’s goal is usually to gain access to sensitive and valuable company resources, such as intellectual property, customer data or payment data.

How does a cyber attack start?

A cyber attack starts with the attacker choosing a target, which can be an individual, an organization or a specific vulnerability, such as outdated software or weak security configurations. Attackers gather information about the target through techniques such as scanning networks, searching for exposed systems, or even mining data publicly available online. Once they have enough information, they exploit system weaknesses to gain unauthorized access.

How does a cyber attack work?

  1. Initial access: the attacker establishes a position in the system, often by exploiting vulnerabilities or using social engineering methods such as phishing to trick users into giving up their data. This can also include brute force attacks on weak passwords or the use of stolen credentials from previous data breaches.
  2. Execution: after infiltrating the system, the attacker can execute malicious code that is often disguised as legitimate software or embedded in files such as email attachments. The code usually connects to the attacker’s server and downloads additional tools or instructions.
  3. Higher privileges: the attacker attempts to gain higher privileges on the system, such as administrator access, in order to move freely and perform more advanced operations. Often this involves exploiting system vulnerabilities or misconfigurations.
  4. Expanding the attack: after gaining access to a single system, the attacker moves laterally across the network, attempting to gain control of multiple devices and access to sensitive areas such as databases or domain controllers. Often, they reuse credentials or exploits other vulnerabilities to spread.
  5. The ultimate goal: the attacker can steal data, install ransomware to encrypt files and demand payment, disrupt traffic, or sabotage the network. In some cases, the attacker remains hidden for an extended period of time (Advanced Persistent Threat / APT) and continues to extract valuable data.
Throughout the whole process, attackers use a variety of techniques to avoid detection, such as encryption, obfuscation or log deletion. Cyber attacks can vary in complexity, but often follow this general pattern: The process of a cyber attack

Cyber attack types

There are many types of cyber-attacks occurring in the world today. Knowing the different types of these attacks makes it easier for us to protect our networks and systems from them. In this section, we will take a closer look at the most commonly occurring cyberattacks that can affect an individual or a large company, depending on the scale.

1. Malware definition

Many people don’t know the answer to the question of what malware is. They have met it, heard about it, but they don’t know how to define it. Malware is any type of software designed to damage, misuse or gain unauthorised access to computers, networks or devices. It is used by cybercriminals to steal sensitive data, disrupt operations or take control of systems for malicious purposes. Malware can enter your system through fraudulent emails, malicious downloads, infected websites or compromised software updates. Once inside the system, it can perform a variety of malicious activities, such as stealing data, spying on users or corrupting files.

Malware types

  • Rootkit attack – unlike other malicious codes, a rootkit is a set of software tools that are used to open a “back door” in the victim’s device. This allows the attacker to install additional malware, such as ransomware and keyloggers, or gain remote access and to take control over other devices on the network. To avoid detection, rootkits often disable security software. Once a rootkit gains control of a device, it can be used to send spam, join a botnet, or collect sensitive data and send it back to the attacker.
  • Trojan horse (Trojan virus) – a Trojan horse is a program downloaded and installed on your computer that appears to be harmless, but is actually malicious. Usually this malware is hidden in an innocent-looking email attachment or a free downloaded application. When the user clicks on the attachment or downloads the program, the malware is transferred to their computing device. Once inserted, the malicious code will perform whatever task the attacker has designed. Often this is to launch an immediate attack, but it can also create a backdoor that the hacker will use in future attacks.
  • Spyware virus – once installed, spyware monitors the victim’s Internet activity, tracks login credentials, and spies on sensitive information – all without the user’s consent or knowledge. For example, cybercriminals use spyware to obtain credit card and bank account numbers and to obtain passwords. Government agencies in many countries also use spyware – most famously a program called Pegasus – to spy on activists, politicians, diplomats, bloggers, research labs and allies.
  • Ransomware cyber attack – ransomware is a type of malware that blocks access to files or an entire system by encrypting them. After blocking access, the aggressors demand a ransom to decrypt them. This type of attack is usually very fast and can also affect backups, making it difficult to restore systems without paying a ransom. Ransomware is often spread through phishing emails or infected websites. A famous example is the WannaCry ransomware attack, which affected thousands of organizations worldwide.
  • Adware – adware is software that displays unsolicited advertisements on a user’s device, often without the user’s consent. Although adware may not always be malicious, it can disrupt the user experience by slowing down the device and displaying ads continuously. It is often installed unknowingly, for example alongside free software. In some cases, adware can track a user’s online behaviour to target ads or obtain sensitive data.
  • Worms virus – worms are self-replicating malicious programs that spread over networks without the need for user interaction. Unlike viruses, worms do not need to bind to other programs or files. Their main goal is to infect as many devices as possible and spread as quickly as possible. Worms can cause serious damage, such as overwhelming networks, slowing down systems or installing more malware. An example is the Morris Worm, one of the first major Internet worms.
  • Botnet – a botnet is a network of infected devices (called “bots”) that are under the control of an attacker. The devices in a botnet can be used for coordinated attacks, such as distributed denial of service (DDoS) attacks, in which the botnet overwhelms the target server with an excessive number of requests, thus taking it out of service. Devices can be infected with various types of malware, often without the user’s knowledge. Botnets are also used to spread spam or steal data.

2. Denial of service attack definition

A denial-of-service attack (DoS attack) is a malicious, targeted attack that floods a network with fake requests in order to disrupt business operations. In a DoS attack, users cannot perform normal and necessary tasks, such as accessing email, websites, online accounts or other resources that are hosted by the compromised computer or network. Although most DoS attacks do not result in data loss and are usually resolved without paying a ransom, they do cost an organization time, money and other resources to restore critical business operations. The difference between DoS and distributed denial of service (DDoS) attacks is related to the origin of the attack. DoS attacks originate from a single system, whereas DDoS attacks originate from multiple systems. DDoS attacks are faster and harder to block than DOS attacks because multiple systems must be identified and neutralized to stop the attack.

3. Phishing definition

Phishing is a cyber-attack in which an attacker attempts to extort sensitive information such as usernames, passwords, credit card numbers or other personal data from individuals. It is usually a fraudulent communication, often in the form of an email or text message that pretends to come from a legitimate source, such as a trusted company or colleague.

Phishing types

1. Email phishing

Email phishing is the most common type of phishing attack, in which aggressors send fraudulent emails en masse, pretending to come from trusted sources such as banks, online services or well-known companies.
  • The email contains a malicious link or attachment that, when clicked, redirects the victim to a fake website that resembles a legitimate one. Victims are then tricked into entering personal information such as login or credit card details.
  • Example: an email that looks like it’s from a bank and asks you to update your account details using the link provided.

2. Spear phishing

Spear phishing is a more targeted form of phishing aimed at specific individuals or organizations.
  • Unlike mass phishing emails, spear phishing attacks use personalized information (such as the recipient’s name, job title or details of a company project) to make the message look more legitimate.
  • Example: a spear phishing email may appear to come from a colleague or boss asking you to send sensitive company information or reset your password.

3. Whaling

Whaling focuses on high-ranking individuals within an organization, such as CEOs or senior executives.
  • Aggressors pose as a trustworthy person, often using urgent business matters as a lure. These emails are highly personalised and target executive-level information such as business credentials, financial data or strategic plans.
  • Example: an email to a CEO posing as a legal authority or other senior executive requesting sensitive business documents or large bank transfers.

4. Vishing (voice phishing)

Vishing includes phishing attacks conducted via phone calls.
  • Aggressors pose as trusted organizations such as banks or government agencies and persuade victims to provide sensitive information such as passwords, bank details or social security numbers.
  • Example: a phone call from your bank asking for your account number or PIN to “verify” your identity.
5. Smishing (SMS phishing) Smishing is phishing via SMS or text messages.
  • The attacker sends a text message containing a malicious message or phone number that urges the recipient to take urgent action. The goal is often to steal personal data or infect a mobile device with malware.
  • Example: if an e-mail message appears on the Internet that is related to a mobile phone, it may contain, for example, a text message claiming that your bank account is blocked and asking you to click on a link to verify your account details.

4. Spoofing attack

The definition of a spoofing attack is simple. It is a type of cyber attack in which an attacker impersonates a trusted entity or system to deceive individuals or systems into granting access or sharing sensitive information. The main objective is to gain unauthorized access, steal data or launch further attacks under the guise of a legitimate source. Spoofing can occur in a variety of contexts, from email communications to network connections.

Spoofing types

1. E-mail spoofing

Aggressors send fraudulent emails pretending to come from a trusted sender, such as a colleague, business partner or a well-known company. By changing the “From” field in the email header, they create the impression that the email is coming from someone else. This type of spoofing is often used in phishing attacks to trick the recipient into sharing sensitive data or clicking on malicious links. Example: receiving an email that looks like it’s from your bank and asks you to log in or reset your password using a fraudulent link.

2. IP spoofing

Aggressors manipulate the source IP address in the packet header to make the packet appear to come from a trusted or known IP address. IP spoofing is commonly used to gain unauthorized access to a network or to launch distributed denial of service (DDoS) attacks by flooding a target with traffic from many spoofed IP addresses. Example: an attacker sends malicious data packets to a system that appear to come from a trusted source on the network.

3. URL spoofing

Attackers create fake websites to mimic legitimate websites, often with the aim of stealing sensitive information such as usernames, passwords or payment details. An attacker registers a domain name similar to a trusted website, changing one or two characters to trick users (e.g., “g00gle.com” instead of “google.com”). When users visit the fake website, they are tricked into entering sensitive information. Example: a fraudulent website that looks like an online banking login page but is actually controlled by an attacker to obtain login credentials.

4. ARP spoofing

An attacker sends spoofed ARP messages within the local network to associate its MAC address with the IP address of another device, often a gateway or router. This type of attack allows an attacker to intercept, modify, or stop the transmission of data between devices on a network. It is often used in Man in the Middle (MITM) attacks. Example: if an attack occurs on the network, it is possible that an attack that violates the rules that apply to the network will occur on the network: the attacker will intercept the communication between your device and the router, allowing him to monitor or modify the data that is sent and received.

5. Identity-based attacks definition

Identity-based attacks are very difficult to detect. If a user’s valid credentials have been compromised and an adversary is impersonating that user, it is often very difficult to distinguish typical user behaviour from that of a hacker using traditional security measures and tools.

Types of identity-based cyber attacks

1. Man in the middle attack (MITM)

A MITM attack occurs when an attacker secretly intercepts and potentially alters communications between two parties. The goal is often to steal sensitive data such as login credentials, banking information or personal details. The attacker inserts themselves between the victim and the target, often using techniques such as Wi-Fi eavesdropping or DNS spoofing. The attacker can simply listen in on or modify a conversation, redirect funds, convince the victim to change passwords, or perform unauthorized actions. Example: capturing communication between a user and their bank during an online transaction.

2. Pass-the-hash attack

In a Pass-the-Hash (PtH) attack, cybercriminals steal a hashed version of the password, which is an encrypted representation of the original password. Instead of cracking the password, the aggressors use the hash directly to authenticate and start a new session. This attack is common in Windows environments where the hash is stored and transmitted over the network. Example: an attacker gains unauthorized access to a corporate network by using a stolen hash from an attacked device without cracking the actual password.

3. Golden ticket attack

The Golden Ticket attack involves exploiting vulnerabilities in the Kerberos authentication protocol used by Microsoft Active Directory. Aggressors create a “golden ticket” that gives them unrestricted access to the domain controller and other critical resources on the network. By using the golden ticket, aggressors can bypass authentication and retain persistent access. Example: an attacker steals key data from a domain controller and creates a golden ticket that allows unrestricted access to the organization’s entire network without the need for re-authentication.

4. Silver ticket attack

Silver ticket attack is similar to golden ticket attack but has a more limited scope. Aggressors create fake service tickets to gain access to specific services. After stealing the password to an account with service-level access, the attacker creates a fake authentication ticket that provides unauthorized access to a specific service (e.g., file shares, databases) on the network. Example: gaining access to a specific application server by forging a service ticket using a stolen password.

5. Credential harvesting

Credential harvesting refers to the collection of user credentials, including usernames, passwords and other login credentials, often through phishing, keylogging or intrusion. Attackers collect this information in order to use it for unauthorized access or to sell it on the dark web. Login credentials are often collected in bulk from a variety of sources, including phishing websites or malware infections. Example: a phishing email tricks the victim into entering their login details on a fake website, which the attackers then use to gain access to their real accounts.

6. Credential stuffing

Credential misuse involves using stolen credentials from one compromised system to attempt to access other systems. Since people often reuse passwords across multiple accounts, aggressors attempt to log into unrelated services (such as email, social networking, or banking) using credentials obtained from other breaches. Example: using credentials stolen from a compromised e-commerce website to attempt to access a victim’s social media accounts.

7. Password spraying

An attacker attempts to gain access to many accounts using one or more common passwords, thus avoiding being blocked. Unlike traditional brute force attacks, which target a single account with many passwords, a password hashing attack targets many accounts with several common passwords (e.g. “password123”). This helps avoid detection mechanisms that lock accounts after multiple failed login attempts. Example: an attacker tries the password “Welcome2023” on hundreds of user accounts within an organization.

8. Brute force attacks

A brute force attack involves systematically guessing passwords or encryption keys by trial and error until the correct password is found. Aggressors use automated software to quickly try different combinations of usernames and passwords. If they have enough time and computing power, they can eventually find the right combination. Example: an attacker uses a tool that, after trying thousands of combinations, guesses the correct password for an administrator account.

6. Code injection attacks

Code injection attacks involve an attacker inserting malicious code into a vulnerable computer or network to alter its course. There are several types of code injection attacks:

1. SQL injection

The SQL Injection attack exploits system vulnerabilities to inject malicious SQL statements into a data-driven application, which then allows a hacker to extract information from the database. Hackers use SQL Injection techniques to alter, steal, or delete data from an application’s database. Imagine a website with a sign-up form. Normally, the application would send an SQL query to the database in the form: SELECT * FROM users WHERE username = ‘user’ AND password = ‘password’; However, if an attacker enters the following string in the username field: ‘ OR ‘1’=’1′ The SQL query could look like this: SELECT * FROM users WHERE username = ” OR ‘1’=’1′ AND password = ‘password’; This query is now always true because ‘1’=’1′ is a condition that is always satisfied. The attacker can log into the system this way without knowing the actual login credentials.

2. Cross-site scripting (XSS)

Cross Site Scripting (XSS) is a code injection attack in which an attacker inserts malicious code into a legitimate website. The code is then executed as an infected script in the user’s web browser, allowing the attacker to steal sensitive information or impersonate the user. Web forums, discussion boards, blogs and other websites that allow users to post their own content are the most susceptible to XSS attacks.

3. Malvertising

The attack usually starts by breaking a third-party server, allowing the cybercriminal to insert malicious code into the ad being displayed or into an element of the ad, such as banner ad copy, a creative image or video content. When a website visitor clicks through, the corrupted code in the ad installs malware or adware on the user’s computer.

4. Data poisoning

Data poisoning is a type of cyber attack in which an adversary intentionally compromises a training dataset used by an artificial intelligence or machine learning model in order to manipulate the operation of that model. When manipulating the dataset in the training phase, the adversary may introduce bias, intentionally create incorrect outputs, introduce vulnerabilities, or otherwise affect the predictive capabilities of the model.

7. Supply chain attack

A supply chain attack is a type of cyber attack that targets a trusted third-party vendor that offers services or software critical to the supply chain. Software supply chain attacks inject malicious code into an application to infect all users of the application, while hardware supply chain attacks compromise physical components with the same goal. Software supply chains are particularly vulnerable because modern software is not written from scratch: rather, it includes many off-the-shelf components such as third-party APIs, open source and proprietary code from software vendors.

8. Social engineering cyber attack definition

Social engineering is a technique in which attackers use psychological tactics to manipulate people into performing a desired action. Using powerful motivators such as love, money, fear and status, they can obtain sensitive information that they can later use either to blackmail an organization or to use this information to gain a competitive advantage.

Social engineering attack types

1. Pretexting

In pretexting, aggressors gain access to information, a system, or a user by faking a false scenario to gain the victim’s trust. This includes impersonating an investment banker, a human resources employee or even an IT specialist.

2. Business email compromise (BEC)

In a BEC attack, attackers assume the identity of a trusted user to, among other things, trick a company’s employees or customers into making payments or sharing data.

3. Disinformation campaign

Disinformation campaigns are deliberate efforts to spread false information, especially for political or war-related reasons. Adversaries use social media networks, which reach huge audiences, to spread false narratives through the prolific use of bots and fake accounts, creating a false sense of common opinion.

4. Honeytrap

Honeytrap attacks target people looking for love or friendship on dating apps/websites. Attackers create fake profiles and use the timelessly built relationship to trick the victim into giving them money, information or network access to install malware.

5. Tailgating/Piggybacking

Tailgating, also known as piggybacking, is a type of attack that is carried out in person by having the attacker stick close to an employee of the company and asking them to hold the door for them. Once inside the facility, the adversary attempts to physically steal or destroy sensitive information.

9. Insider threats definition

IT teams that focus solely on external threats are only addressing part of the security environment. Internal threats involving current or former employees pose a significant risk because these individuals have direct access to the company’s network, sensitive data, intellectual property, and often have valuable knowledge of business processes and policies that could facilitate an attack. Although many insider threats are malicious and motivated by, for example, financial gain from selling confidential information on the dark web or emotional manipulation through social engineering tactics, not all are intentionally malicious. Some are the result of negligence. To effectively address both malicious and reckless insider threats, organizations should implement a robust cybersecurity training program. This training should educate employees on recognizing and mitigating potential security risks, including those posed by insiders.

10. DNS tunneling definition

What is DNS tunneling ? DNS tunneling is a type of cyber-attack that uses Domain Name System (DNS) queries and responses to bypass traditional security measures and transfer data and code across a network. Once infected, the hacker is free to perform command and control activities. This tunnel provides an avenue for the hacker to launch malware and/or obtain data, IP or other sensitive information by encoding it bit by bit in a series of DNS responses. DNS tunneling attacks have proliferated in recent years, in part because they are relatively easy to deploy. Tunneling toolkits and tutorials are even readily available online through mainstream sites such as YouTube.

11. IoT-based attacks

An Internet of Things (IoT) based attack is any cyber attack that targets an IoT device or network. Once compromised, a hacker can take control of a device, steal data, or join a group of infected devices to create a botnet to launch DoS or DDoS attacks. With the number of connected devices expected to grow rapidly, cybersecurity experts expect IoT infections to grow as well. In addition, the deployment of 5G networks, which will encourage the use of connected devices, may also lead to an increase in attacks.

12. AI-powered attacks

As AI and ML technologies improve, the number of use cases is also increasing. Just as cybersecurity professionals use AI and ML to protect their online environments, attackers are using these tools to gain access to networks or steal sensitive information.

Adversial AI/ML

Adversarial AI/ML attacks aim to disrupt or manipulate AI and machine learning systems by introducing misleading or inaccurate data during the training phase. By carefully crafting inputs that exploit model weaknesses, attackers can cause artificial intelligence to make incorrect predictions or decisions. Example: imagine an autonomous vehicle powered by artificial intelligence that uses machine learning to recognise traffic signs and make driving decisions based on them. An attacker could use adversarial techniques to subtly change the appearance of a stop sign so that it appears to the vehicle’s AI system as a Yield Right of Way sign. These changes could be imperceptible to human eyes, but would cause the sign to be misinterpreted by artificial intelligence, potentially leading to dangerous driving behaviour.

Dark artificial intelligence (Dark AI)

Dark AI refers to the malicious use of AI and ML technologies designed to exploit system vulnerabilities. Unlike conventional attacks, Dark AI often operates covertly, making it difficult to detect until significant damage is done. It uses advanced AI techniques to carry out sophisticated and covert attacks. Example: the use of AI-driven tools to automatically discover and exploit security vulnerabilities in software or systems.

Deepfake

Deepfake involves the use of artificial intelligence to create highly realistic but fake media, including images, videos and audio. These fakes can deceive viewers by making it appear as if people said or did things they never did. Deepfakes can be used to manipulate public opinion, damage reputations or interfere in political processes. Example: a doctored video of a political figure who made controversial statements that never actually happened.

AI-generated social engineering

Social engineering attacks generated by artificial intelligence include the creation of sophisticated chatbots or virtual assistants that mimic human-like interactions. These AI systems engage in conversations with users to obtain sensitive information or persuade them to take malicious actions. Example: a persuasive chatbot with artificial intelligence posing as customer service asking users to provide personal information or login credentials.

How can a cyber attack be prevented?

Cyber attacks will become more frequent and sophisticated. The good news is that there are several things organizations can do to minimize the risk.

Update your software

Updated software systems are more resilient than outdated versions, which may have weaknesses. Updates can fix all bugs and weaknesses in the software, so it is optimal to have the latest version. In addition, consider updating your software by investing in patch management.

Install a firewall

Firewalls are useful in preventing various attacks such as DoS attacks. They work by controlling the network traffic that passes through the system. A firewall also stops any suspicious activity that it deems potentially harmful to the computer.

Back up your data

When you back up your data, you move it to a different, secure storage location. This could be using cloud storage or a physical device such as a hard drive. In the event of an attack, backing up your data allows you to recover any lost data.

Data encryption

Data encryption is a popular method of preventing cyber-attacks and ensures that data is only accessible to those who have the decryption key. To successfully attack encrypted data, aggressors often have to rely on the brute force method, where they try different keys until they guess the right one, which makes breaking encryption difficult. Use strong passwords and avoid using the same password for different accounts.

Use strong passwords

To prevent attacks, you should have strong passwords in the first place and avoid using the same passwords for different accounts and systems. Repeated use of the same password increases the risk of aggressors gaining access to all your information. Updating your passwords regularly and using passwords that combine special characters, upper and lower case letters and numbers can help protect all your accounts.

Use two-factor authentication

Use two-factor or multi-factor authentication. Two-factor authentication requires users to provide two different authentication factors for their authentication. When more than one additional authentication method is required in addition to your username and password, this is referred to as multi-factor authentication. This turns out to be an important step to secure any account.

Participate in comprehensive cyber security training

Comprehensive cyber security training is one of the most effective ways to gain practical knowledge and skills to protect yourself and your business from cyber attacks. Such training provides participants with an in-depth understanding of the different types of threats and techniques to compromise systems and obtain sensitive data. In addition, participants will learn practical methods to detect, prevent, and respond to these attacks.

Conclusion on cyber attacks

In a digital age where we increasingly rely on technology, protecting against cyber attacks is an essential part of every organisation and individual. Cyber threats such as malware, ransomware, phishing and man-in-the-middle attacks are becoming increasingly sophisticated, causing serious financial and reputational damage. Therefore, it is critical to have a robust cybersecurity strategy in place that includes not only technical measures, but also thorough user and employee education. Properly securing data, monitoring activity on the dark web or investing in elite threat scanning services are just some of the key steps organisations can take. Regular cybersecurity training is also essential to minimize the risks of human error.

Podcast #1: Work-life balance and healthy work-life boundaries

The first episode of our “Na vlne kodu” podcast (in English On the Wave of Code) was prepared in cooperation with the online platform Ksebe.sk. With Dominika Neprasova we talk about how to set boundaries between work and private life, how to avoid burnout or how to say no. We wish you a pleasant viewing, listening or reading. In today’s episode, we’re going to cover a topic that is increasingly topical in our hectic society. It’s Healthy Work-Life Boundaries. While technology is great, it can make it difficult for us to rest and recover, resulting in overwork and, in extreme cases, burnout. This theme resonates not only among the wider public, but also in various specific professions – for example, in the IT sector, where constant connectivity and technological pressure can cause problems with We’ll take a closer look at why work-life boundaries are so important and how to respect them. Our guest is psychologist Mgr. Dominika Neprašová from the online platform Ksebe.sk.

Podcast “Na Vlne Kodu”

‘Na Vlne Kodu’ (On the Wave of Code) is an IT podcast by msg life Slovakia. It regularly covers topics from the fields of psychology and HR, as well as IT news. Listen to more episodes of Na Vlne Kodu.

Dominika, thank you for coming. Tell us something about yourself. What made you start focusing on the boundaries between work and private life? Thank you very much for the invitation. I am a psychologist at the Ksebe platform and also at the Salvus health centre in Bratislava. I am involved in counselling and therapy with young adults and adults, either individually or in a couples context. I am also enrolled in long-term psychotherapy training and in the specialty of clinical psychology, which is like the certification that doctors have in our country. My psychological journey was first preceded by a career in HR. I worked in this field for four years. I started at the Grafton recruitment agency, then I worked in People Operations, or HR, at a Slovak start-up, where I was responsible for the overall care of employees. And it was in this context, maybe because of my psychology background, that I started to pay more attention to the topic of worklife balance. People are overworked, they often tend to burn out. They don’t know how to set boundaries, they don’t know how to use the word NO. These themes also come up in my psychology practice. While for young people the most common themes are relationships, emotionality or self-development, the older or middle generation mainly deals with the topic – how to set up a work-life balance and what themes emerge in it. Everyone has their own themes in their career, such as self-worth, self-fulfilment, self-esteem, etc. And in that whole context, those themes actually intertwined into my current work. What is the definition of healthy boundaries? Healthy boundaries define our living space: not only the physical, but also the mental, which is subjective. Having boundaries means keeping your distance from other people, knowing how to say no, stand up for yourself and take care of yourself. This protects us in a dynamic world where we can sometimes be shouted down by the louder ones. Healthy boundaries serve to define us in a certain way, and that can ultimately help us.

‘Healthy boundaries define our living space. They give us the opportunity to express who we are, to say no, and to stand up for ourselves.’

In today’s world, we are often faced with the need to be online all the time. Technology forces us to work harder than is healthy. How does this affect our mental and physical health and our lives? How to prevent burnout? This is quite difficult to observe. If we don’t have the capacity for self-reflection and self-awareness, sometimes we have trouble stopping. Time is really fast and the stimuli are many. I often ask my clients what they would find out about themselves if the world stopped now. Sometimes I get answers like – maybe I’d find out I’m overworked. Well, and those boundaries at work manifest themselves, for example, in the way that we can’t keep deadlines, we do overtime because we have to, because the work won’t wait for us. We can’t say no to colleagues, we’ll get involved in 35 projects even though we know it’s beyond our limits.

“Ask yourself: What would you discover about yourself if the world stopped right now?’

Mentally it affects us in that we are tired, overworked, exhausted. It affects our mood a lot. We are often explosive, reacting to every little stimulus. Hand in hand with this go the physiological aspects. A lot of us get sick because when we are under prolonged stress and expectations, immunity breaks down. For example, one of my clients was always sick. And then we found out that she was actually still stressed. But physiology doesn’t have to be just about immunity, it’s also associated with migraines or headaches, for example. It can also be related to the fact that we sit a lot at work and our musculoskeletal system suffers. Everything is very interconnected and for someone problems appear in both areas, for someone only in mood changes, for example. Psychosomatics are also very common, for example various digestive, stomach problems. The body reacts to stress, and digestive problems are currently at the top of the list of symptoms by which people react to stress in their lives.
Recommend
We recommend:

Read also: Back pain from sitting at a computer: Tips for correct posture and workout.

How does this affect our overall productivity and happiness? We psychologists are told to take care of ourselves first and then take care of others. This is actually said on the flights as well. We always have to put the mask on ourselves first and then the child. And that is really true. Because if we don’t have energy, we can’t do anything for other people. It impacts our happiness, how we approach our work, how we handle stress and respond to stimuli. It applies also to me, my clients can sense if I’m tired. We just can’t fake our body language.

‘Take care of yourself first. Only then will you be able to take care of others.’

What are the long-term consequences of not having free time, of not being able to make time for ourselves? We are suppressing ourselves. Each of us needs fulfillment in more areas than just work. We have three roles in our lives. They are work, family and social relationships. If we don’t think of our limits and suppress them, the overwork, the lack of energy, the fatigue, the illness, the exhaustion, the mental collapse to burnout – these are all consequences that are evidently clear, not only in the waiting rooms of doctors when people want PN’s, but also in us psychologists. People just can’t take it anymore. They don’t like doing the work as much as they used to, and the fire is going out of them. If one is capable of empathy or sensitivity, one sees in people how they change. Why do you think it’s hard to set boundaries? FOMO (Fear of Missing Out) syndrome is very common in Generation Z or the younger generation. They don’t want to miss anything, they want to be everywhere, they want to be involved in everything so they don’t miss out. And it spills over into the work sphere as well. When they have the opportunity to work on such a project, to go on such a service and to help in this, they want to realize themselves in every way. At the same time, there may be mental aspects to it, such as feelings of inadequacy or imperfection. People who can’t set boundaries are often perfectionists, and they have a lot of other issues that get in the way of them setting boundaries. Everyone has their own beliefs in setting boundaries and some private logic that they work from. That is, if I have a private logic that if I don’t do my best, I won’t be good enough, then I’m going to do 120% so that my beliefs don’t come true. What does burnout syndrome look like in the general public? Is it different for people who work in IT, for example? On first hearing, I would say there is not that much difference. Burnout syndrome or burn-out syndrome has 4 phases. First we react to stimuli with great enthusiasm, then the enthusiasm gradually decreases, frustration, mood swings, a drop in energy, until it hits the nervous system and the body to the point where we actually drop completely. A lot of people also end up in intensive care or in bed because the body collapses. Well, although at first glance there’s probably not that much difference, when we focus more on the IT area, it’s really very specific. IT people have very sedentary jobs that are often monotonous and extremely focused. Burnout in them can result just from the fact that they’re spending, say, 12 hours a week paying attention to something very intense. At the same time, IT professionals are often more introverted. That’s not a stereotype, it’s really about the fact that they choose to work that way because of it. Just the fact that they are not in touch with the outside world, but only with themselves, their head and the job, can lead to burnout.
Recommend
We recommend:

Our tip: In our next podcast, we’ll take a closer look at the topic of Burnout.

Let’s take a look at individual strategies to improve your work/life balance. What are the experts’ recommendations and your personal tips on how to improve our work/life balance? Working in HR, but also psychology, has taught me that when results speak, those are the ones that speak the loudest. It’s just the best argument we have. Someone is really capable of getting the job done in 6 hours, and for 2 hours they can just spin around in a chair. Someone takes longer, everyone has their capacity. For example, I am a person who loves my free time. This is also due to the fact that I don’t have a family, I don’t have children, so I have more free time and it doesn’t quite compare. But I’m so burdened by it that I feel it on myself when I don’t have enough of it. When I had a lot of projects when I was a student, I felt like I wasn’t enjoying it at all. All I had in my head was that I had to be there and I had to do it. It was so overwhelming that I said enough is enough and made a change. I made it quite early, I was 25 at the time. For somebody, it comes later when the burden hits them. It helps a lot to make to-do lists, for example. Plan what I am able to do for the day. It helps someone to realistically check off tasks so they can see them and have tangible proof of what they planned and what they accomplished. And at the same time, if tasks happen to keep me at work longer, it’s only natural. I’ll drag it out longer, but then I think to myself, and if there’s an opportunity, I’ll leave early the next day. For example, when I had interviews at work until six to seven, which was long after my work hours were over, I would then leave a little bit early that next day. Because the working hours are 8.5 hours, unless somebody has set it otherwise. It is standard working hours. Plus we have some KPIs or some indicators of the results of our work. If I meet those KPIs, I don’t have to meet them 100%, but at least 85%, the work still has to wait for the next day. So why not take that time for yourself? Why not leave work at that seventeenth hour and spend time with family or your hobbies, or just sit down and relax on the couch? The theme of toxic hyperactivity or productivity also lives in society. We still have to do something. But we don’t have to. We are overloaded. Even after work, we’re still in a rut. We don’t have to function that way. It’s perfectly fine to sit down, relax, watch a show or go for a walk. That’s also an active pastime. So the most important tips are that we need to think about ourselves because it’s going to catch up with me somewhere anyway, at the same time that work will always have tasks waiting for us and that if we can deliver those results, we have an ace up our sleeve. How to organize our time better? How should employers support their employees in maintaining a good work-life balance? It is important to remember that our life is a series of decisions. So it is our decision to set a healthy boundary or to have that work life balance. We decide whether we will still go do xy other activities after work or just relax. We have that fully consciously in our hands. When someone says they can’t, they’re making excuses. We can decide how we allocate that time. The best indicator of how to set this up in companies is to lead by example. Whether we’re in the HR department or we’re in senior management, we’re team leaders, etc. I’ve worked with a number of managers who have really led by example for their employees. I also had a boss who knew that we were doing 100% during the work day, sometimes up to 120 and sometimes she would send us home at 4 o’clock. And she went home too. She was an example to us both in that she didn’t let herself get completely worn down by the work, and she also built up in us the awareness that work-life balance is very important. If managers were able to set an example for employees, employees might view boundaries differently and the overall company culture would be affected. Because it is different to say that we have the corporate benefit of work-life balance, only then what is the reality? Is that really what the leaders of that company, or the corporate culture bearers, are doing? Or is it just a marketing ploy to attract employees?
Recommend
We recommend:

Read also: Interview with a psychologist: Do companies have a responsibility for employee mental health?

What practical tools can we use to better manage our time? What would you recommend? The most important and practical tool is to realize that I can decide how I am going to manage my time. At the same time, I have to realize what themes enter into it when I can’t have that work-life balance, for example. If someone tells me they can’t do that, we go over the themes together. Because not knowing how to have a work-life balance is actually purposeful behavior. It brings something to us that we can’t steady it, and that’s what I go after with those clients. Practical tips include, for example, planning a program for myself to look forward to after work. That I’m going to put that spin on it, that I’m going to quit my job and I’m going to dedicate myself to this. Because if we can choose to be at work longer, we can choose to be at work a little bit shorter. Of course, with the limitations that work has. Something different works for everyone, it’s hard to answer in general like that. I don’t really work that way anyway, because people can read tips on the internet on how to work with boundaries. But once we realize that it’s about those conscious decisions, one can change the rhetoric. That I don’t have to, but I can. Even that perception will affect how we think about it. When we change our thinking, it will affect how we behave and ultimately how we feel. It’s like a formula or a lineage of those steps that are interconnected and we can influence them nicely for ourselves.

“Change your mindset from ‘I must’ to ‘I can’. When you change the way you think, your behaviour and how you feel will change too.”

Do you think we use the word NO enough? What rituals can we cultivate to help us properly define healthy boundaries? The word NO is extremely important, but we use it extremely little. In particular, our generation, and perhaps partly the previous generation, has not been led to say the word. I have many friends who already have children. If they are with their grandparents and they say NO to something, those grandparents will say she is an ugly little girl, NO is not said. This is exactly what we have coded into us. That’s why it’s extremely difficult for us because we don’t know how to use the word NO. Saying NO is very important and in many situations even self-preserving. I don’t want to go to the extreme, but I can think of many different situations when saying NO is really necessary. There’s a pretty good tip to start saying NO when it’s very sharp for us because we didn’t know how to use it before and suddenly we’re supposed to do it. When I want to communicate something, for example healthy boundaries, quite in the middle are the so-called “I” statements, through which I speak through myself. I don’t have to say NO, I’m not going to do this. What I can say is that I’m totally uncomfortable doing this work because it causes me stress, puts me in a bad mood, or I know that I might be prone to failure and I’d rather avoid this work or get involved in some other project. It’s like such a roundabout way of saying this, but at the same time it’s not, because JA’s statements bring us back to ourselves and to the awareness of what we need, what we want and what we are experiencing.

‘We are not used to saying no. However, it is very important to do so. However, we can communicate healthy boundaries through ‘I’ statements.’

NO is really an extremely big topic. Even when clients come to me with other topics, we always get to that NO. This is because the inability to say NO is associated with other topics. Even in that work context, I can imagine it quite beautifully. I can’t say NO to my boss because she just needs a little help with something, even after hours. But I won’t say NO to her because she’s my boss. People are afraid of being replaceable. In a work context, we are also concerned about salary, about having a job. We have to support ourselves, a family, so it’s kind of that lash over us that just don’t say NO. But I think if we say NO, people will respect us a little bit more. Because if we’re always nodding at somebody, people get used to it and they completely violate our personal space and respect goes down a little bit. If someone keeps saying yes to us, we get so used to it that then we’re totally waving to that person. Can you share some specific examples from practice? Do you know people who have successfully managed to set work-life boundaries? How did they manage to do it? A lot of times people get it when they come into therapy. Because they come when they feel that something is wrong, when they are dissatisfied, sad, nervous and so on. If we examine those areas of life that I was talking about, we come to the conclusion that the problem is somewhere at work, for example. As an example from my practice, I have one client who needed to change jobs. She couldn’t set healthy boundaries in her original one. But not because she couldn’t, but because the culture and environment prevented her from doing so. Also, admitting to change and finding a new job is actually building that healthy boundary against a toxic work environment. Another client, for example, had a huge self-evaluation in the topic of the thesis. When she didn’t do something 100%, she felt that she had completely failed, that she was inadequate, imperfect. She was able to build healthy boundaries by realizing that anyone can make a mistake at work. It doesn’t mean she is bad or imperfect. She was able to separate herself and her self-worth from her work, and that’s what helped her build that healthy boundary. I also had a client in a management position where the topic of healthy boundaries was about how to find and build them outside of work. He didn’t set boundaries at work because he didn’t know what values to pursue after that job. We named what he would enjoy, what he would like to pursue and then he didn’t need to be at work for 15 hours because he knew he could go play golf afterwards, for example. The examples are really different, but if I have to underline something, it is the fact that everyone has their own themes involved. For example, if we don’t know how to say NO, which makes it difficult to set healthy boundaries, it can also be the obedient child syndrome. That I don’t want to disappoint others, I don’t want to upset others’ expectations, I want to be liked, I want to be accepted. This particular theme is very common. Dominika, if you had something else to recommend to our listeners – maybe just one piece of advice for maintaining those healthy boundaries, what would it be? It may sound pathetic, but I would say there is only one life. If we sacrifice it just to work, we lose a lot of those nuances or other aspects of life that are waiting for us. Work always will be and always has been. Those emails and phone calls will just wait for us. At the same time, if we realize that if we don’t have those boundaries and if we don’t have the energy for ourselves, we can’t keep putting it out and we can’t put it into that work. If we are to be productive at work, work-life balance and healthy boundaries can help us do just that, because the work itself will reflect that perfectly. Whether we have the capacity for it, whether we are nice to our colleagues or whether we argue with everybody, are irritable, it will show in that work. And so in other areas of life, in our relationship with ourselves and so on.

‘There’s only one life. Do you really want to sacrifice it for work?”

And what tools and resources would you recommend to support a better work-life balance? What about, for example, IT professionals who are feeling overwhelmed, overworked and looking for a way to find balance? At work, it would definitely be frequent breaks for that physiology, for that movement, but also for that mental reboot. If they work from home, certainly some socialization. If the IT professional or the female professional has the capacity to do that, then contact with a community, with a human being, is really very necessary. Well, and just try to find some hobbies of their own, so that they’re not just behind a computer, for example. Dear listeners, thank you for joining us today. We say goodbye to you Mgr. Dominika Neprašová and for msg life Slovakia Ivana Hricová. Remember, it is okay to set boundaries and take care of your health. Continue to follow us on social media such as Facebook, Instagram, LinkedIn and also our website msg-life.sk, where you can find out more about other episodes from the field of HR, psychology or news from the world of IT. Our next topic will be Working from home and its impact on well-being. Have a great day and don’t forget to relax and switch off.

CODECON Bratislava 2024 – visit msg life stand, find a job and win attractive prizes!

On June 5, 2024, the tenth edition of the largest community conference for software developers in Slovakia, known as CODECON #Bratislava, will take place in the historical building of the Old Market Hall in Bratislava. This unique event, organized by developers for developers, celebrates ten years of connecting and empowering the IT community. We will be there too with our msg life Slovakia stand.

One of the Top IT conferences in Slovakia

In the ten years of its existence, CODECON Bratislava has become a renowned platform for IT enthusiasts of all levels – from students to experienced professionals. The conference offers a great environment for learning, sharing experiences and making valuable contacts, while supporting innovative projects and talented individuals. CODECON Bratislava is designed for all IT professionals, regardless of their level of experience. Whether you’re an experienced developer looking for a new challenge or a student looking to learn more about the IT industry, this conference is for you.

Codecon Agenda 2024: AI and Data

CODECON Bratislava 2024 conference will be dedicated to artificial intelligence and data. The IT conference programme will include lectures and discussions on the latest trends and technologies, with an emphasis on their integration into different areas of life. The main topic will be the practical use of AI, including ethical and technological issues, space applications and the impact of AI on the transformation of industry and society. Attendees will learn about the technical challenges in developing the Czech Large Language Model LLM and how AI can strengthen the security of web applications and APIs using Kubernetes. Other topics will include the use of Python and neural networks in big data environments and efficient implementation of multi-layer perceptrons.

Meet msg life Slovakia in person

Our company, which specializes in the development of software solutions for insurance clients in the DACH region, will also be present at the event. The largest clients of msg life Slovakia include AEGON, AXA, ERGO, GENERALI and many other companies offering life and non-life insurance products. We offer a wide range of job offers for talented developers, testers, business IT analysts and other IT professionals, including AI enthusiasts. We pride ourselves on our family atmosphere and we make sure that everyone feels comfortable. We offer a wide range of employee benefits. We organize various corporate events, teambuilding, which can also be attended by family members.

Visit our stand and find a job

At the CODECON Bratislava 2024 conference at our stand we will be happy to answer all your questions about our company, benefits and current job offers. In addition to information about working at msg life Slovakia, we will also offer you at our stand:
  • Fun activities and a competition for a voucher worth 100 euros.
  • Sweet treats, where we can chat about Java while enjoying them.
  • Awesome programming diary.

Jobs for developers

At msg life Slovakia we are looking for employees especially in the field of software development and testing. A job position which is still in demand are Java developers who want to participate in the development of modern software solutions. As a Java developer with us you will have the opportunity to:
  • Work on interesting and innovative projects in the insurance industry.
  • Utilize your skills and knowledge in Java, Spring Boot, Microservices and other technologies.
  • Work with and learn from a team of experienced developers.
  • Continually develop and improve your IT skills through high quality training and mentoring.
If you are interested in a job as a Java developer at msg life Slovakia, visit our booth at CODECON Bratislava 2024!

Security software and antivirus software

The internet has revolutionized the way we live, work and communicate. But it also brought cyber threats on the internet that can disrupt our privacy and security. These cyber threats can come in many forms, from hackers and cybercriminals to viruses and malware. They may use a variety of deceptive tactics to gain access to their victims’ accounts or systems in order to obtain personal, financial or sensitive data. In this article, we’ll take a look at what threats we know about on the internet and how to protect ourselves against them.

Cyber threats on the Internet

The most common threats on the Internet include the following:
  • Malware: malicious software that is designed to disrupt or damage computer systems. This includes viruses, worms, Trojan horses, ransomware and spyware.
  • Phishing: a tactic used by cybercriminals to steal personal information such as usernames, passwords and credit card numbers. This is often done by sending emails or messages that appear to be from a legitimate source, but are in fact designed to deceive the recipient into giving their personal details.
  • Hacking: involves gaining unauthorised access to a computer system or network. This can be done by exploiting vulnerabilities in the software or using social engineering tactics to trick users into providing their login credentials.
  • Denial of Service (DoS) attacks: are aimed at overwhelming a computer system or network with excessive load, preventing it from functioning properly. This can be achieved by sending a large number of requests to the server or by overwhelming the network with traffic.
  • Social engineering: represents the use of psychological manipulation to trick users into giving up their personal information. It can include tactics such as phishing, pretexting and baiting.
  • Botnets: is a network of compromised computers that can be used to carry out a variety of malicious activities such as DDoS attacks, sending spam and stealing personal data.
  • Insider threats: involve individuals within an organization using their access to confidential information for malicious purposes, such as stealing data or damaging the network.

What is an antivirus definition?

In order to effectively defend against existing threats, we need to install a suitable antivirus software on our device. What is an antivirus meaning, you ask? Antivirus is a type of software that is used to prevent, scan, detect and remove viruses from a computer. Once installed, most antivirus software runs automatically in the background and provides real-time protection against virus attacks.

What is security software?

Security software is any computer program designed to affect information security. It is often used in the context of defending computer systems or data. Security software is designed to protect and secure servers, laptops, mobile devices and networks from unauthorized access, intrusion, viruses and other threats. It can help protect data, users, systems and companies from a wide range of risks.

Antivirus protection

Anti-virus protection helps protect files and hardware from malware such as worms, Trojans and spyware, and may offer additional protection such as customizable firewalls and website blocking.

How antivirus works

Anti-virus software works by regularly scanning your devices for and blocking known viruses, as well as new and emerging malware mutations. If your device becomes infected, antivirus software will help you remove it. These programs use several forms of detection to provide the best possible protection.

Antivirus benefits

The goal of antivirus software is not only to protect the system from security threats and vulnerabilities, but also to provide real-time protection through automatic vulnerability scanning. An antivirus program provides the following benefits:
  • Virus and malware protection: the main advantage of antivirus software is protection against malicious viruses such as malware and spyware.
  • Protection against spam and pop-ups: one of the most common ways viruses infect and infiltrate your system is through pop-ups and spam-based websites. Antivirus software secures the system by automatically blocking pop-ups and spam originating from malicious websites.
  • Real-time protection: antivirus software acts as a real-time shield that scans every incoming file and program. Depending on the settings of the antivirus program, when an infected file or program is detected, it is automatically removed or moved to a quarantine folder for further analysis. The quarantined file is prevented from interacting with the rest of the computer and its programs to mitigate damage.
  • Boot-scan command: sophisticated viruses can often duplicate themselves while the system is active. However, an antivirus program can prevent the virus from self-replicating by invoking the boot-scan command. This command shuts down the operating system (OS), restarts the computer, and checks the entire hard drive for viruses and malware. During the scan, the virus is detected and thanks to the deactivation of the operating system, it has no chance to self-replicate.
  • Scanning the dark web: data from most data leaks, such as ransomware attacks, often ends up on the dark web. Many antivirus tools can help companies detect whether their sensitive data has been leaked to the dark web or not. For example, if antivirus find an associated email address or account number on the dark web, it can alert the user and update the password to a new and more complex one.
  • External device protection: most people regularly connect external devices such as hard drives and USB adapters to their computers. The antivirus software scans all connected devices and peripherals to prevent potential viruses from entering the system through external sources.
  • Spam protection: this is basically protection against unwanted messages or unsolicited advertisements.
  • Identity theft protection: antivirus can protect your sensitive information from hackers.
  • Parental controls: many antivirus providers also offer parents the ability to control their children’s online activity and prevent them from visiting inappropriate websites or downloading harmful content to their devices.

Why antivirus scan failed ?

The role of an antivirus is to protect our devices from malware attacks such as viruses, malware and ransomware. However, what happens when your antivirus program suddenly crashes and says “virus scan failed”? Here’s a look at a few possible causes of this problem and how to treat them.
  1. Software updates
One of the most common reasons why an antivirus scan can fail is because of out-of-date software versions. Antivirus programs regularly release updates that include new cyber threat definitions and bug fixes. If you don’t update your antivirus program, its ability to detect and remove threats may be limited. The solution is to regularly update the software and its definitions.
  1. Software conflicts
Another reason could be a conflict between the antivirus and other software installed on your device. Some applications may compete with an antivirus program for access to system resources or may contain elements that are interpreted as threats. In that case, you can try disabling or uninstalling other apps that might be causing the conflict.
  1. System errors
Some system errors or file corruption may prevent the antivirus program from working properly. In such cases, you may need to use system repair tools or reinstall an antivirus program to fix the problem.
  1. New threats
Sometimes a new, unknown threat can be the cause of an antivirus scan failure. Antivirus programs rely on their threat definitions to identify and remove threats. If a new threat appears before your antivirus database is updated, your scan may fail. In this case, it is important that you inform the antivirus provider of the problem and request a database update.

Antivirus – best options and criteria for choosing

All of us are looking for the best antivirus to protect our devices, but unfortunately, not all antivirus products provide a reliable and usable solution that provides an adequate level of protection against malware. When evaluated against the following criteria, even the top 10 antivirus solutions on the market can score very differently, so think carefully about your choice.
  • Reliability
Even the most thorough antivirus solution can prove completely useless if it conflicts with other software running on your computer. If these conflicts lead to malfunctions or temporary suspension of antivirus protection processes, it can make your device vulnerable to attacks.
  • Usability
If the day-to-day use of an antivirus solution requires special skills, it may be impractical for many users. In some cases, if the antivirus software is too complex to run, the user can simply turn it off and remain unprotected.
  • Speed and performance
Although you can’t avoid slowing down your system after installing an antivirus, you should at least check and compare how much your chosen antivirus programs will tax the performance of your computer or smartphone.
  • Comprehensive protection
An antivirus solution should provide continuous protection for all computer domains, all file types and all network elements that could be subject to attack by a computer virus or other malware.
  • Quality of protection
Regardless of whether you need security software for Apple or Windows , each must be able to operate in an aggressive environment that is constantly changing – with new computer viruses, worms, and Trojan horses that can be far more complex than previously known malware and may include new ways to evade the effects of antivirus programs. The quality of protection depends in part on the following:
  • the effectiveness of malware detection processes
  • frequency and regularity of updates
  • the ability to remove infections from your computer
  • the effectiveness of providing computer protection – without significantly impacting computer performance
  • Affordability
The antivirus should be affordable and the price should match the quality of the service.
  • Application intuitiveness
An antivirus program should be easy to use and intuitive – there is technical complexity and technical jargon associated with computer security, but these should not be a barrier for the user.
  • How many devices can you use it on
Many households no longer have just one desktop computer and family members often have their own laptops and smartphones or tablets. That’s why antivirus manufacturers offer the option to use it on multiple devices – so you can protect the whole family for just one fee.
  • OS compatibility
Today, it is no longer the exception that every device in the home runs a different operating system (e.g. Windows on a laptop, Android on a tablet and iOS on an iPhone). So check in advance which OS the selected antivirus supports. When choosing an antivirus, you can rely on user and discussion forums where users share their real experiences and knowledge, or you can check sites with independent antivirus tests and expert reviews, for example here.

What antivirus for laptop?

1. Norton 360 Deluxe If you need an antivirus for your laptop or PC, this antivirus includes almost everything most users need, without the extras. In addition to an antivirus engine and firewall to protect against malware and network threats, you’ll also get malicious link and attachment scanning, dark web monitoring and webcam protection. Norton also offers 50GB of cloud backup storage, access to a password manager and VPN, parental controls, and desktop tools that include the ability to monitor outdated software. The only downside is that it can have a high impact on the performance of some computers. 2. Bitdefender Total Security Bitdefender Total Security Antivirus is a comprehensive solution that provides cybersecurity for your Windows, macOS, Android and iOS devices without affecting their performance or battery life. Bitdefender antivirus can eliminate all forms of network threats, including traditional viruses, worms, Trojans, as well as modern threats such as RATs, ransomware attacks and various types of exploits, rootkits, botnets and spyware. It provides theft protection, parental control, VPN, Firewall, webcam and microphone protection, web browsing protection and secure online payment. 3. ESET HOME Security Ultimate ESET HOME Security Ultimate Antivirus protection is a complete home security solution that effectively guards your computer while minimizing the impact on your operating system performance. It uses advanced AI-based technologies that actively fight all forms of internet threats without slowing down your computer or affecting the functionality of your operating system. Whether you need privacy protection, do online banking, shop online or just read the latest emails, ESET HOME Security Ultimate is the ideal choice. It is compatible with Windows, Mac and Android phones or tablets. Take a free online antivirus test. ESET antivirus also offers the option to take an online antivirus test for one free scan of your device, which also removes all threats. Click on the link and select the free trial option. It will download an installation file, which you can run to get here: Run the free online antivirus test installer. Now just set your language and click Run. Hopefully your test result will look like this:Set your language and run ESET's free antivirus test. 4. McAfee Total Protection McAfee Total Protection security software and protection package provides protection from the latest spyware, malware and ransomware threats not only for you, but also for your family, ensuring maximum protection for your privacy and identity. It also protects your computer and personal data from attacks by hackers and cybercriminals. Antivirus McAfee is highly regarded for its ability to optimize your computer’s performance – automatically blocking videos from running on websites and minimizing bandwidth usage. You’ll surely appreciate that McAfee Total Protection is compatible with Windows, Mac OS, iOS and Android, meaning you can easily secure all the devices in your home with one software. McAfee provides secure web browsing, home network security with a firewall, online support with security experts, secure storage and password management. It offers a license for 3 devices for 12 months. 5. Avast Ultimate Avast Ultimate Antivirus includes every product you need to take care of your devices, all in one convenient package. Avast is one of the most reliable antiviruses, but puts more strain on device performance than its competitors. There’s also a free version that offers you protection from viruses, malware, ransomware attacks, as well as WiFi network protection and network device monitoring. The paid version provides powerful real-time protection against viruses, malware, ransomware and other threats on all devices, Avast AntiTrack Premium helps users protect their personal data from online tracking and provides enhanced anonymity when browsing the web. It provides a protected mode for online banking and shopping. It also includes a built-in Firewall and anti-spam filtering to protect your computer and your email inbox from unwanted content and unauthorized access. The following products are part of the license:
  • Avast Premium – reliable antivirus protection
  • Avast Secureline VPN – protects your network privacy
  • Avast Cleanup Premium – for thoroughly cleaning your device of unnecessary files
  • Avast Passwords Premium – password manager
  • Avast AntiTrack – helps users protect their personal data from online tracking
6. AVG Internet Security AVG is best known for its excellent free antivirus software, but there’s good reason to upgrade. AVG Internet Security not only offers more comprehensive protection, but also easy management of these tools. The Internet Security plan builds on the free version’s protection against malware and web, email and network threats by adding five features. You get protection for passwords stored in browsers, webcam hijacking, unknown access to sensitive data files, malicious redirection of websites you’re trying to visit (DNS hijacking), and attacks conducted through the Windows Remote Desktop Protocol. As well as scanning your computer and network in real time, AVG Internet Security monitors malicious websites as you surf online – and even monitors where your email address appears online. If it detects it in a data leak, an alert will appear in the app. You can use AVG Free as your antivirus for windows 10 protection. You can also use it as a Windows XP or Windows 11 antivirus. 7. Windows Defender We’re all familiar with Microsoft Defender – it’s a simple, free protection against malicious cyber threats that’s automatically installed on your Windows devices. Because Microsoft Defender is free, you can run and use it instantly, anywhere. Windows also offers security protections for larger enterprises, if needed. As an antivirus, it covers everything you need to protect – from scanning your device, to quarantine prevention, to removing viruses that may have been on your computer. You’ll find more features in other antivirus packages, such as online privacy tools, VPNs and encrypted cloud backup. However, this free protection provides everything the average user needs and protects your device well against most threats. 8. Avira Avira is a free protection for Windows devices that uses a variety of supervised and unsupervised artificial intelligence methods, as well as machine learning techniques to improve malware ad detection. The antivirus tool also includes an ad monitoring feature, digital footprint cleaning tools and a shield for scanning emails and social networks. In addition, Avira offers its own free VPN protection. 9. Total AV Total AV is a powerful and easy-to-use antivirus program that uses the Savapi antimalware engine, which is used by more than 500 million users worldwide. Total AV protects your computer and mobile devices from viruses, malware, adware and spyware in real time. It offers a feature-rich package with an intuitive interface. It’s a great choice for anyone who needs an affordable and effective cybersecurity tool that’s easy to manage. It is compatible with Windows, Apple Mac, iPhone/iPad and Android devices. Total AV has built-in phishing URL blocking, they also have a password manager, VPN and ID protection to give you the highest level of security. Full system scanning and real-time scanning will work silently in the background, constantly and consistently checking for potential threats and overall device health. The results are displayed in a clear and transparent format. Total AV has many other features such as VPN, Ad Blocker, Browser Cleaner and System Tuning. 10. Sophos Intercept X Endpoint – Linux antivirus Sophos Intercept X Endpoint provides excellent network protection for home and business users. It uses an extensive proprietary malware database and advanced heuristics to find and remove all types of malware. Intercept X Endpoint is compatible with all major Linux distributions and allows easy security management of all types of devices through the Sophos Central control panel (which is similar to the Bitdefender control centre). Sophos Intercept X Endpoint includes:
  • Malware scanner on request
  • Firewall management
  • Real-time malware protection
  • Scheduled scanning
  • Wide support for distributions

Antivirus programs – comparing the best antivirus for your device

Antivirus name Price Key Features Rating
AVG Antivirus Free Free Basic protection against viruses, malware and ransomware 4/5
Avast Free Antivirus Free Basic virus, malware and ransomware protection, firewall, web protection 4.5/5
Bitdefender Antivirus Plus €49,99/year Extensive virus, malware and ransomware protection, firewall, web protection, parental control, VPN protection 5/5
ESET NOD32 Antivirus €59,90/year Extensive virus, malware and ransomware protection, firewall, web protection, parental controls, banking and online payment protection 4.5/5
Kaspersky Anti-Virus €59,99/year Extensive virus, malware and ransomware protection, firewall, web protection, parental control, VPN protection, privacy protection 5/5
McAfee Total Protection €79,99/year Comprehensive virus, malware and ransomware protection, firewall, web protection, parental control, VPN protection, identity protection, performance optimization 4.5/5
Norton 360 Deluxe €69,99/year Extensive virus, malware and ransomware protection, firewall, web protection, parental control, VPN protection, identity protection, cloud backup 5/5

Antivirus & Mobile – antivirus for Android and iOS devices

Antivirus for Android

1. Bitdefender Mobile Security Bitdefender Mobile Security provides excellent malware protection with little impact on performance. It also includes tools such as app lock, Wi-Fi scanner, anti-theft features, and data breach alerts. Price: €12/year 2. Norton Mobile Security Norton Mobile Security provides great protection against malware and has an intuitive design. Its App Advisor feature checks apps that use too much data or behave suspiciously, which could indicate they are malicious. Price: 9.70€/year 3. Avast Mobile Security Avast Mobile Security provides good protection against malware with minimal impact on system performance. The paid plan also includes additional anti-theft features, an app clipboard and technical support. You can also get access to Avast’s SecureLine VPN service as an add-on to one of the paid plans. Price: 6.99€/year

iOS antivirus (antivirus for iPhone)

iPhones are generally considered more secure compared to other types of smartphones due to Apple’s strict security measures and the closed nature of the iOS operating system. However, it is said that every device should have an antivirus installed for its security – is iOS an exception? Partly. Although Apple has designed its iOS system to be relatively untouchable, it’s still possible to get a virus on your iPhone. The most likely way for this to happen is the so-called jailbreak, when you’ll go around operating system restrictions. You can do this to get more control over your device and download any apps or programmes from anywhere on the internet. Basically, it lets you do whatever you want with your iPhone. But when you also allow your device to download apps from unknown sources, you’ve opened up iOS to a wider range of apps, features, and themes, none of which are approved by Apple! This means that without antivirus protection, you’ve just exposed your device to all kinds of attacks. 1. Norton Mobile Security This antivirus was already mentioned above, but it’s not only the best for Android devices, but also for iOS devices, which is why it deserves the top spot on this list. 2. Avira Mobile Security Avira’s Avira Mobile Security Antivirus is a free, all-in-one antivirus that protects you from theft and scammers. It may not offer as many features as other antivirus programs, but you’ll still get basic security for your iPhone without paying huge amount of money. Avira may also be the best choice if you feel your iOS device is already largely secure and doesn’t need additional security features like online shopping and identity protection. Price: free 3. McAfee Mobile Security This antivirus provides a secure VPN for online privacy, protecting your identity from risky Wi-Fi connections, secure browsing, system scan for the latest updates. It comes with a free VPN to secure public wi-fi. Price: 10.99€/year 4. Bitdefender Mobile Security With Bitdefender’s antivirus, you get the most effective threat protection with the least impact on your battery. Protect your personal data such as passwords, addresses, social and financial information, check your phone’s security, prevent accidental disclosure and misuse of data for all installed apps, protect your calendar and messages from fraud and phishing attempts, get an overview of your online activity and history of attacks you’ve defended against, and enjoy online communication with a sense of security by checking your online accounts against data breaches. Price: 14.99€/year 5. AVG Mobile Security Pro If you have an iOS device and want to get free antivirus, iPhone, Mac and iPad can all be protected by simply downloading the AVG Mobile Security app from the App Store. While you won’t have the network protection of a VPN, it will provide you with monitoring and password leak protection, as well as photo protection with a security vault. We hope that our article has helped you to get an overview of antivirus and security software.

I think AI will one day be better at evaluating some decisions than humans, says our colleague Daniel

At msg life Slovakia, we strive to keep up with innovation. An example of this is our two latest projects, where a job seeker can talk to an AI-equipped chatbot instead of reading a lot of text. The implementation of ChatGPT on the web is already yielding first positive results and the chatbot is currently being debugged. Behind this idea is our colleague Daniel from marketing. You focus on online marketing, you have also worked in similar posts before. Why did you become more interested in artificial intelligence and its applications? I was tired of writing reports. Each month I tracked selected columns and reported the data to people who mostly didn’t even look at it. So I tried to make this monotonous work easier for myself. I made a course through Udemy, using which I created an auto clicker. Its job was to regularly export data from the sites. I started to simplify the stereotypical part of my work and what could be automated, I automated. The only last step left for me was to check the data. Nowadays, similar parsing bots are common, which was not the case a few years ago. I also became interested in automating work. To give a global reason, I think that each of us lives in their own ecosystem, equipped with different experiences, different skills, and thus sees only a slice of reality. Therefore, in my opinion, one is not able to judge things in a completely objective and comprehensive way. Humans and artificial intelligence (AI) have different ways of perceiving reality. We often rely on subjective perceptions, experiences, assumptions, guesses and emotions, whereas AI is based on the data and algorithms that are provided to it, thereby assuming a more objective outcome. That’s why I think artificial intelligence will one day be better able to evaluate some decisions than a human. (Read our article What is artificial intelligence? Is AI really intelligent?) However, even AI has its limitations. For example, AI cannot recognize and interpret certain kinds of information that are obvious to humans. AI can also be affected by lack of data or poor quality of data it receives. Ultimately, both humans and AI have their advantages and disadvantages. Ideally, humans and AI could work together and leverage their strengths for optimal results. That is why I think it is already worth paying attention to the development of artificial intelligence so that we can exploit the strengths of both sides. Do you have enough support from msg life Slovakia to implement similar innovative projects? Our management believes that we cannot miss the trend and need to constantly explore new opportunities. We’ll see what it brings, but it’s always better to try than to be left behind. We also see the hiring projects Java developer and Actuarial developer as a learning process. We didn’t set one goal that when achieved, the project is over. We’re exploring ways to use AI and we’re always improving our websites. Based on our findings, we are also considering how to use artificial intelligence internally, how to use it to speed up some monotonous processes and leave employees more time for work where a personal approach is required. Personally, I’d like to try connecting the chatbot to an email and experiment how it will respond. It should be trained on me and plausibly simulate what I would write myself. It takes me a lot of time to create an email and AI could do it faster. Artificial intelligence could also be used for the creative part of work, when we often wonder if the visuals are aesthetically pleasing. The AI should be able to create the most appropriate graphics based on the previous data. I have also recently been attracted to the idea of financial planning using artificial intelligence. What takes a human several hours to evaluate, an AI could do in seconds. The human’s job is then just to check the results and improve the algorithms. I have even read about a Polish company called Dictador whose management has been fully replaced by AI and so far they are generating good results. We will see how they continue to do. This is quite a rarity, so I’m curious to see how it all turns out! We currently have a chatbot deployed on two sites. Its job is to answer questions to potential job candidates. What are the first results? The vast majority of projects have very similar phases and it looks like this time will be no different. The first is to start the project with some expectations. If we were to imagine a graph, from this point the curve would rise steeply upwards in time until it reached a point called the optimism peak. This is the stage where imagination meets reality and often crashes into it. From this point onwards, the progress of the project usually has a rather decadent phase, followed by a phase of real implementation of the first requirements. A graph showing the expected results after deploying a chatbot on a website. This is when the progress of the project hits rock bottom, which is why this phase is also called the Valley of Despair. But if the team overcomes it and solves all the obstacles, there is progress. Not as steep as at the beginning, when expectations were high, but a very “healthy” climb that corresponds to reality. Eventually the project reaches the Enlightenment phase, from which it continues to progress, but at a much slower pace, so much so that we could call it stagnation. This is because many lose their initial enthusiasm at this stage and it is the job of management to keep the project moving forward. Our websites have already passed the initial stages and are starting to show the first results. They are visited by relevant people, now it’s up to us to decide how to use this data and how to refine the project to perfection. I see room to automate and speed up some parts. This would leave our rather busy HR department with more or less only the final phase, where they would connect with the suitable candidate and get a feel for their personality. The initial formalities and data evaluation could be handled by AI. Both chatbots work using ChatGPT. Currently written communication is possible with them. What are the next steps in this project? Since we don’t develop our own AI, we only use what Open AI offers. They have recently introduced a new feature, voice communication, and these days they are also launching ChatGPT Vision. Communicating by voice will be much easier, as one will no longer even need to click on the keyboard. Vision, in turn, is supposed to provide more personalized responses based on the emotions of the recipient. The ability to create a face for the chatbot is encouraged here as well. It’s up to the discretion of the management how an avatar representing msg life Slovakia should look like, I personally would go without the AI visualization and I have two reasons for that. The first is that an avatar can generate (sometimes too much) sympathy, but equally dislike. Conversations could thus be significantly affected by this, which would unnecessarily undermine their factuality. The second reason is that the choice of avatar is not always a happy one. We see this with some humanoids. As soon as they have a face whose facial expressions are not always appealing, a kind of fear or even disgust arises, which is another negative consequence that we do not want to arouse. If we take inspiration from science fiction works, artificial intelligence is usually depicted virtually, as a kind of software that controls everything, but nobody can see it. We don’t want to create another human, we want to create something more intelligent. For this reason, our motif for the time being is the sphere. It is also an element that msg life Slovakia has in its logo. At the moment, we have only one challenge left to solve, and that is the name of artificial intelligence. Most bots use the female gender. This is probably because the female voice is more credible, it inspires a kind of confidence. There are probably psychological reasons for it. A man is more likely to confide in a woman because they expect more understanding and support from her. I think this is true in the case of woman-to-woman communication, as well as man-to-woman communication. What do you think are the shortcomings of ChatGPT so far? Despite what a groundbreaking and very useful tool it is, we encounter quite trivial problems when working with it, such as the fact that the system crashes frequently. I’ve also noticed that if I retrieve data one day that the AI understands and generates a very relevant response, the next day it doesn’t remember this for some unknown reason. Apparently, such nuances are also caused by constant updates and improvements, which may not always improve the system. I am also limited in the number of experiments. After some time I get a message that I have filled my daily quota of requests and I have to wait. It is conditioned by the capacities that the system has and its creators probably did not expect such an influx of users. Another long-standing problem has been so-called hallucination, where the system’s priority has been to generate an answer at any cost, even at the expense of the truth. Such an excessive effort to informatively satisfy the user quickly crashed and the developers tried to remove it as soon as possible. I would also consider the uproar that is being created around the company to be a negative. It has to do with just where the company got the input from, and many of the facts lead to the conclusion that it wasn’t entirely legal. On the other hand, it has to be said that compared to competing tools, ChatGPT has a big head start. But if I had to predict the future, I predict that Google’s Bard will catch up very quickly. It is not yet as well developed as ChatGPT, but it has the advantage that it processes real data. While ChatGPT has stored data up to a certain year, Bard can search through current information. This is, and I think will be in the future, an increasingly important difference. As for Microsoft’s Bing-Chat, for example, I think it generates the most appropriate answers. However, if all these companies were to come together, they would make a lot of progress. In my opinion, competition comes at the expense of quality in this case. They would make faster progress by working together, but they would lose the market leadership and dominance they seek. How far do you think the possibility of AI in the world of hiring extends? I think we can expect to see a lot of fake HR profiles on LinkedIn in the near future. This will also increase the number of spam messages. However, companies will have to do it in a subtle way so that messaging is not too fast and they are not blocked. As I mentioned earlier, I think HR will lose some of its workload. I wouldn’t see this as a negative, because firstly they will probably get rid of stereotypical work activities such as sending GDPRs, writing back to initial emails or searching and evaluating suitable candidates. For this reason, I think that recruitment agencies, whose role is to supply suitable candidates for positions, will also be at risk in the future. This will also reduce costs for companies that are currently investing significant amounts of money in the recruitment process. Investing in the development of AI or tools that use it can therefore be a profitable and rewarding investment for companies. Do you think the staffing industry will be a lot less personal if the initial stages of recruitment are taken over by AI? It will, but I don’t think that’s a bad thing. To give you an example: we used to buy a ticket for public transport from a lady sitting at a kiosk, but nowadays we do it with a machine or an app. Although we lost a short small talk on the way to work and the salesperson had to be retrained for another job, the service to users was improved. They can buy a ticket faster and can pay by card, which may not have always been possible before. It has improved the service to the customer and that, I think, is the goal of any company.
The competitiveness of companies and their tools comes at the expense of quality when it comes to AI chatbots.
The competitiveness of companies and their tools comes at the expense of quality when it comes to AI chatbots.
Also, if using chatbots reduces some of the emotions at the first interview, it may not be a bad thing. If a candidate (or even a recruiter) is having a bad day, this may not be taken into account and only the facts, i.e. experience, skills or expectations, will be considered in the first rounds. So the evaluation of whether a person fits into the collective would fall to the later round, which would be led by real people. You’ve been working on AI for a while now, studying a lot about it and testing it from many angles. Is there anything about artificial intelligence that surprised you? Did you have different expectations or ideas than you have about its functioning today? Yes, artificial intelligence has interested me for some time. I follow its development, research and try to understand its principles, functioning and how to make it work. In many ways the AI surprised me, but especially in the following areas:
  • Speed of development: AI is evolving at an incredible speed. A few years ago, AI systems were only able to perform simple tasks such as playing games or image recognition. Today, they are capable of performing much more complex tasks, such as generating creative content or writing different kinds of text.
  • Scope: AI is used in many different fields today, from healthcare and finance to manufacturing and logistics. Its potential is huge and expanding all the time.
  • Ethical issues: AI also raises a number of ethical issues, such as the question of accountability for the actions of AI systems or the question of the potential discriminatory effects of AI systems. These issues need to be addressed in order for AI to be used safely and responsibly.
In the past, I thought AI would function more like a simple machine that can perform tasks as instructed. Today, however, I know that AI is much more than that. It is able to learn, adapt and can generate creative and original ideas. This surprised me a lot and I’m fascinated to see what AI can do in the future. I believe AI has the potential to change the world for the better. It can help us tackle some of the world’s most pressing problems, such as climate change or poverty. However, it is important that AI is used responsibly and ethically. We need to make sure that AI is used for good things.  

Artificial intelligence and password security: AI can now steal your passwords

Artificial intelligence (AI) is fast becoming part of our everyday lives. Whether it’s chatbots artificial intelligence, or in other areas such as artificial intelligence and programming, or technology, healthcare and finance. AI has the potential to bring many positive things to society, but it also has the potential to pose a threat to our privacy and security online (check our article internet safety tips). When was the last time you changed your password? After reading this article, you might want to do it immediately. One of the potential artificial intelligence dangers is that it can be used to steal passwords. Hackers can use AI to train models that are able to predict passwords based on information available about us online. This information may include our names, dates of birth, addresses and even our hobbies. Researchers at Cornell University have also discovered a new way for AI tools to steal your data – keystrokes. A new research paper details an AI-driven attack that can steal passwords with up to 95% accuracy by listening to what you type on the keyboard. After just a few keystrokes, artificial intelligence began to narrow down the possible combinations. By the time you finish typing in the entire strong password, there’s a good chance the AI has already guessed it. A bit disturbing, isn’t it? We all know that using the same passwords over and over on different sites is a bad idea, but now even your most secure passwords could be vulnerable to this new threat. The researchers came to this conclusion by training an AI model based on the sound of keystrokes and deploying it on a phone. The integrated microphone listened to keystrokes on the MacBook Pro and was able to reproduce them with 95% accuracy, the highest accuracy the researchers have recorded without using a large language model. The team also tested accuracy during the call via the Zoom app, in which keystrokes were recorded using the laptop’s microphone during the meeting. In this test, the artificial intelligence was 93% accurate in reproducing keystrokes. In Skype, the model was 91.7% accurate. Before you throw out your loud mechanical keyboard, it’s worth noting that the volume of the keyboard had little to do with the accuracy of the attack. Instead, the AI model was trained based on the progression, intensity and timing of individual keystrokes to identify them. For example, you might press one key a fraction of a second later than others because of your typing style, and the AI model takes that into account. The researchers used CoAtNet, which is an AI image classifier, for the attack and trained the model on 36 keystrokes on a MacBook Pro, each pressed 25 times. There are several ways around this kind of attack. What won’t help you, however, is a new keyboard. Even the best keyboards can fall victim to attack due to the way it works, so quieter keyboards won’t make any difference.

4 common consequences of security breach

What happens when a company password is hacked? Once a password is compromised, the company is open to malicious activities that threaten its overall cyber security. Damages can include everything from financial losses to the theft of trade secrets. Here are some typical events after a corporate password breach: 1. Hacked passwords can lead to data theft Data loss is a devastating consequence of a security breach.Financial records, trade secrets, and product development can be compromised because an AI tool figured out the right password, which allows the wrong person to access company data. 2. Hacked passwords can cause business disruption When a breach occurs, one of the most serious consequences can be a complete disruption of the business. For example, a data breach in April 2023 caused a complete disruption of Western Digital’s digital storage services. The costs associated with business disruption can range from thousands to millions of dollars per day, depending on the size of the organization. And when a network security threat succeeds, it can take several weeks to recover from the attack, causing problems such as loss of trust in the marketplace and theft of corporate assets. 3. Hacked passwords can lead to financial theft The financial impact of a security breach depends on the type of cyber attack. The affected company may lose revenue due to shutdowns, stolen funds or fines from regulators. Add to this the cost of administrative improvements, such as fixing security infrastructure or implementing new procedures, and a business can face devastating financial consequences. The cost of a data breach can be devastating. According to a 2022 IBM report, the average cost of a cybercrime incident is $8 million. 4. Hacked passwords can lead to legal liability In addition to regulatory fines, a business that suffers a data breach also faces legal consequences. There are state and federal standards that help minimize the impact of a cyberattack and require a full audit of company records, practices and procedures to ensure that the business was in full compliance with all rules and regulations at the time of the breach.

Tips to protect passwords and online privacy from AI hacker threats

If you want to protect yourself from AI systems that can hack your passwords just by listening to your keystrokes, here are some tips:
  • Don’t enter your password using features such as Windows Hello and Touch ID.
  • Use Password Manager.
  • Use a VPN (What is a VPN? It’s a virtual private network, more below).
The password manager creates and remembers complex and unique passwords for all your accounts. Instead of using the same password over and over again, you’ll have a different strong password for each service.

Password manager – recommended applications:

Most of the following apps can be used as a password manager on pc (desktop, Wndows, mac) or mobile (Android or Apple). You can also find a basic password manager in Chrome, Firefox or Google apps.

1password

The free 1password service is available in a limited free version. Pricing for the paid 1password service starts at $7.99 per month for individual users; a starter package for a team costs $19.95 per month with licenses for up to 10 users. Team Level provides options for as many unique, random passwords as your business needs, along with password management services to keep everything in order. For greater customization, 1password offers an enterprise-level service (pricing options available upon request) that provides additional layers of security such as custom roles and access levels, daily activity logs, and usage reports to help improve your enterprise security efforts.

Dashlane

Dashlane allows users to create completely random passwords on demand to give you continuous security (and the assurance that your important company data is safe). One of the key differentiators that Dashlane offers is a virtual private network (VPN), which is complemented by additional security features. With its VPN and dark web monitoring service, Dashlane provides robust functionality to any business, from one-person operations to large enterprises. Dashlane pricing: for a starter account, you can get 10 licenses for $20 per month – $2 per user. However, this service level does not provide VPN, single sign-on services or on-demand support. A corporate account with all the features and functions that Dashboard offers costs $8 per month per user.

ESET Password Manager

ESET Password Manager is part of the ESET Smart Security Premium package, which costs $139.99 per year for one device, $199.99 per year for three devices, or $299.99 per year for five devices. ESET Password Manager is a password management tool that helps you store, manage and protect your passwords. It offers many features:
  • Secure password storage: ESET Password Manager stores your passwords in an encrypted format so they are protected from unauthorized access.
  • Password generation: ESET Password Manager can generate strong and unique passwords for all your accounts.
  • Autofill: ESET Password Manager can automatically fill in your passwords for you when you log in to websites and apps.
  • Multi-device support ESET Password Manager can be used on multiple devices, so you can access your passwords from anywhere.

RoboForm

RoboForm offers a robust free service that provides unlimited password storage, cloud storage for notes, login sharing, and multi-platform support. It also includes a password generator, two-factor authentication and a mobile app. Paid levels of RoboForm: While the free service offers a reasonable amount of functionality, its paid service allows you to sync information across multiple devices and apps. Pricing for RoboForm’s paid service starts at $23.88 per year for an individual user, $47.75 per year for a family plan that supports up to five users, and an enterprise level that ranges from $29.99 to $39.99 per year per individual user.

NordPass

The free version of NordPass allows users to create and manage passwords, credit card details and multi-factor authentication. Paid versions of NordPass: Premium levels offer additional features such as syncing information between devices, identifying trusted contacts and granting access to secure files to known users. The good news is that Nord offers reasonable pricing structures with regular discounts (especially for first-time users). Its paid service for individual accounts costs $72 for two years, but there is also a discounted rate of $35.76 ($1.49 per month) for the first two years. Family plans with support for up to six users are also available.

Keeper

Individual Keeper pricing: for $35 per year, Keeper provides individual users with a mobile app and browser extension that simplifies password security while syncing data across as many devices as needed. There is also a family plan available for $75 billed annually. Keeper for Business pricing: Keeper Business Starter costs $2 per user per month, with a minimum of five users. You can securely share passwords with team members or trusted colleagues, so you don’t have to worry about hackers intercepting a text message or email. Perhaps best of all, Keeper decrypts the information on your device so it’s never stored on a remote server. Your information stays with you and is never shared with anyone. After leaving the service, all decryption data is deleted. Keeper also has Business and Enterprise tiers with additional features:
  • Enable two-factor authentication
Two-factor authentication adds an extra layer of security to your accounts. Once you’ve entered your password, enter the code sent to your phone via text message or app. Enable two-factor authentication on any account that offers it, such as email, social media, banking, and more. This will help prevent hackers from accessing your accounts, even if they have your password.
  • Use a virtual private network
A VPN encrypts all data sent to and from your devices. It hides your online activity and location, making it much harder for hackers to find out what accounts you’re accessing or intercept keystrokes.

Recommended VPN apps

VPN – what is it? A VPN is a virtual private network that creates a secure and encrypted connection on less secure networks. Allows you to hide your internet activity and IP address.

NordVPN

The award for overall best VPN went to NordVPN, which costs just £2.39 per month and comes with a 30-day money-back guarantee. It has a great balance between best-in-class security and price, so if you want to protect your privacy from everything else, then NordVPN is the best option. The performance is top notch too, boasting a huge number of servers located in almost every country you could need.

Surfshark

Surfshark has earned the Most Advantageous VPN label and you can get it on sale for as little as £1.83 per month and it comes with a 30-day money-back guarantee. Its security is also top-notch with 256-bit AES encryption, audited non-logging policy and automatic shutdown. The performance is also impressive.

ExpressVPN

If you’re looking for a great all-round option that’s very easy to use, then this VPN is for you. ExpressVPN has all the features you could want from a premium VPN: top-notch security, a fast and stable connection, and it’s a great option for streaming.

Private Internet ACCESS

Private Internet Access (PIA) is a VPN service that provides its users with privacy and security on the Internet. PIA offers a wide range of features and services. PIA uses AES-256-GCM encryption, which is considered the most secure encryption on the market. The kill switch will automatically disconnect your internet connection if your VPN connection is interrupted. DNS leak protection prevents your DNS requests from leaking out, which could reveal your real IP address. PIA supports P2P file sharing, so you can download torrent files without worrying about your privacy. It is available on a wide range of platforms, including Windows, macOS, Linux, iOS and Android. In addition to these basic functions, PIA offers several other advanced features. Split tunneling allows users to route certain types of traffic through the VPN and other traffic through their normal Internet connection. Port forwarding allows users to access their home devices from the Internet. Ad blocker blocks ads and other unwanted content. WebRTC leak protection prevents your IP address from being leaked via WebRTC. The price of PIA ranges from $1.98 to $11.95/month, but the price depends on how long you want to use the service. If you don’t want to commit to an annual subscription, you can choose a monthly plan for $3.33/month. The best value plan would be 3 years + 3 months for $1.98/month.

CyberGhost

CyberGhost was created with speed in mind and provides unlimited bandwidth. You can set your location to any location while keeping your address hidden. Choose from over 100 locations in 100 countries. It also provides protection from public Wi-Fi. It provides comprehensive online protection, with 256-bit AES encryption and multiple protocols, plus split tunneling and a kill switch, you know your internet connection is fully protected. All your data is encrypted, and includes additional security features in addition to 256-bit AES encryption and multiple leak protection options. The price ranges from 2.11€ per month, or 56.97€ for the first two years. They also offer a 6-month tie-up for €6.99 per month and a VPN service for one month where the price is €11.99. In addition to the one-month subscription, the other two options come with a 45-day money-back guarantee if you’re not satisfied with the service.

Be careful what personal information you share

The more information about you that’s available online, the easier it is for hackers and artificial intelligence systems to guess or steal your passwords. Be cautious about sharing details such as date of birth, hometown, pet names and other personal facts on social media and elsewhere. Only make public information that you would agree to anyone having access to. Taking these steps will make you a much less attractive target for AI hackers trying to obtain passwords. As worrying as this technology is, with some improved security practices you can help ensure your accounts and data stay safe from these new threats.

Safety is important at msg life

At msg life Slovakia, we regularly participate in Hackerfest, for example, and the experience gained is used by our colleagues to protect their data. If you are a Java developer or IT tester with German, take a look at our employee benefits and respond to the latest job offers!