The new PCs are the basis for "Los" and "Yastreb" automated workstations
Hidden miner silent-XMRig, if improperly removed from a PC, can reappear on the device and grant access to other malware
Experts Discuss Whether It Is Possible to Secure Communication in the Messenger After Durov's Arrest
Fraudsters copy the web page of the Toncoin cryptocurrency
To protect data, users are encouraged to delete correspondence
The Paris Prosecutor's Office plans to make a statement to the press on Monday, August 26
It is claimed that the order was also sent to some businessmen
Durov's case repeats the Assange precedent
Nearly two-thirds of respondents intend to vote electronically in the Moscow City Duma elections
Deputy Davankov proposed introducing labeling of alimony debtors' profiles
The NGate component will hack not only bank cards, but also именные badges and other objects using NFC-based technologies
This platform will help the state and IT infrastructure, but it could also become an attractive target for hackers from countries unfriendly to Russia
The EastWind hacking campaign uses popular services like GitHub, Dropbox, and Quora, as well as Russian "LiveJournal" and "Yandex Disk".
First test data expected by the end of 2024
The development will save state information systems, the financial sector, and cloud infrastructures from attacks from the outside and inside