For the site
in the browser
BEL IN SOFT
+375 (17) 272 17 56
Mob. phone :
+375 (29) 893 33 72
Telegram Whatsapp Viber are available on mobile phone
07.Sep.2020 10:54 AM
Most information security research ignores threats to civil society
In pursuit of government contracts, information security companies focused their attention on economic espionage and APT groups.
07.Sep.2020 10:40 AM
US authorities issue directive to protect space systems from hacker attacks
The developers of such systems will be obliged to think over mechanisms for protecting against signal jamming using proven encryption systems and the latest transmitters.
04.Sep.2020 5:19 PM
Experts talk about how cybercriminals launder cryptocurrency
Hackers often hire middlemen from East Asia who receive a portion of the stolen funds in order to help launder them.
04.Sep.2020 5:05 PM
The FBI has warned of a wave of ransomware attacks on companies around the world
The criminals disguise themselves as Fancy Bear, Cozy Bear, Lazarus Group or Armada Collective and threaten with massive DDoS attacks.
04.Sep.2020 9:54 AM
Office of the Inspector General of the United States dissatisfied with the IT security of NASA
For years NASA has allowed personal and partner IT devices to access sensitive data through its networks and systems.
04.Sep.2020 9:38 AM
British physicists have developed a prototype of the Internet of the future
Physicists have proposed an easily scalable way to distribute information over quantum communication channels among multiple participants.
03.Sep.2020 3:47 PM
US court ruled illegal Snowden's surveillance program
The legality of the program was addressed in an appeal by four members of the Somali diaspora.
03.Sep.2020 3:32 PM
Most IoT equipment is vulnerable to hacking
Most of the sensitive information about the device is stored in poorly protected flash memory.
03.Sep.2020 3:23 PM
Fake NEXTA LIVE app collected information about protesters in Belarus
The application collects geolocation data as well as information about the owner of the device and sends the collected information to a remote server.
03.Sep.2020 10:34 AM
A biometric payment system based on face scan is being introduced in the Moscow metro
Now it is being tested together with the banking partners of the project; closed testing should be completed by October 1.
03.Sep.2020 10:09 AM
Microsoft's new system will help fight deepfakes
Microsoft Video Authenticator uses a special algorithm to determine the authenticity of photos or videos.
02.Sep.2020 2:14 PM
Moscow started testing payment for metro fares by face scan
The Moscow authorities have promised to introduce payment for metro fares based on a face scan.
02.Sep.2020 1:15 PM
Hackers use Telegram channels to steal bank card data
Researchers in the field of cybersecurity spoke about an interesting campaign of cybercriminals.
02.Sep.2020 10:31 AM
Norwegian parliament's computer system hacked by hackers
"Our analysis shows that a different amount of data was downloaded," the message says.
02.Sep.2020 10:16 AM
Data of millions of American voters published on the darknet
Forum users have already found a way to monetize information about American voters.
01.Sep.2020 4:53 PM
Belarus will launch a new satellite. It was developed at BSU
Alexander Lukashenko signed a document on the launch of a scientific and educational satellite of the Belarusian State University.
01.Sep.2020 4:39 PM
Deep Learning to Help Detect Malware
Researchers from Microsoft and Intel have jointly developed the STAMINA project.
01.Sep.2020 4:10 PM
Iranian hackers sell access to networks of compromised companies
In 2019 and 2020, the group hacked into corporate networks by exploiting vulnerabilities in VPN and network equipment.
01.Sep.2020 10:40 AM
Experts have studied the traffic indicators of popular cybercriminal forums
The English-language forums Altenen, RaidForums, Nulled, Cracked TO and Cracking King, the German Crimenetwork and the Russian Exploit and XSS have come under surveillance.
01.Sep.2020 10:21 AM
Vulnerabilities in the Tesla network allowed to take control of the car
Through the Tesla infrastructure, it was possible to obtain superuser rights on the information system of any car.
Новости 121 - 140 of 900