Filters
Cybersecurity and cyberdefense of internet networks. Are Ukraine and the EU ready for a global cyberwar?
Challenges remain serious: ongoing attacks on public sector and critical infrastructure demonstrate that even the...
1 week agoSpoiling FSB professional holiday (3 years in a row)
December 20 is “Chekist Day” in Russia, a professional holiday for the state security agencies....
1 week agoWhat Every Google Chrome User Should Know
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
1 week agoHow can any phone be hacked? The elusive Pegasus.
"Pegasus is the most famous hacker software in the world, which almost everyone has heard...
1 week agoPavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals
eQtalk is an original project by the eQtv channel. The guest of the episode is...
1 week agoEvgeny Vladimirov: Chronicles of russia's Cyberwar Against Ukraine – Energy Sector in Targeting
eQtalk is an original project of the eQtv channel. The guest of the issue is...
1 week agoElement messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
"Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
1 week agoOleksandr Glushchenko, Pavlo Belousov: MAХ messenger – delete it IMMEDIATELY!
Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...
1 week agoHow the U.S. Ambassador Was Spied on for 7 Years with an Invisible Bug—and Its Surprising Link to Electronic Music
In 1945, Soviet spies scored a major victory over their American colleagues: they managed to...
2 weeks agoAuthenticator Pro: review of two-factor authentication app for Android
"There are quite a few apps for two-factor authentication. The most popular one, Google Authenticator,...
2 weeks agoQuantum computer will reveal ALL your secrets (one day)
"In the next 10-15 years, we will experience a quantum revolution - no, not like...
2 weeks agoTips from Nadiyno.org: what personal information should never be disclosed online
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
2 weeks agoThe first world cyber war: confession of a Ukrainian hacker
Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...
2 weeks agoDonate Safely! How Security Forces Track Crypto
"Recently, the FSB announced that it had detained a Russian accused of treason for transferring...
2 weeks agoBig Brother. History of surveillance
"Holmes versus Moriarty. Bastrykin versus a magnifying glass. Aristotle versus a press with spikes. The...
2 weeks agoThe most honest review of the MAX messenger
In this video, "The First Department" examines how secure the MAX messenger is. We find...
2 weeks agoDownloading From the Internet and Checking Links
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 weeks agoTella: How to encrypt and hide files on Android and iPhone
"In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 weeks agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
2 weeks agoTails: secure OS on Debian Linux. Portable version
"Tails is a great solution if you need to work on someone else's computer and...
2 weeks ago