Filters
Cybersecurity and cyberdefense of internet networks. Are Ukraine and the EU ready for a global cyberwar?
Challenges remain serious: ongoing attacks on public sector and critical infrastructure demonstrate that even the...
6 days agoSpoiling FSB professional holiday (3 years in a row)
December 20 is “Chekist Day” in Russia, a professional holiday for the state security agencies....
6 days agoHow can any phone be hacked? The elusive Pegasus.
"Pegasus is the most famous hacker software in the world, which almost everyone has heard...
6 days agoPavel Belousov, techlead at Nadiyno.org: Attack schemes and the psychology of cybercriminals
eQtalk is an original project by the eQtv channel. The guest of the episode is...
7 days agoEvgeny Vladimirov: Chronicles of russia's Cyberwar Against Ukraine – Energy Sector in Targeting
eQtalk is an original project of the eQtv channel. The guest of the issue is...
7 days agoElement messenger on Matrix: free, anonymous, decentralized, with end-to-end encryption
"Free, cross-platform, open source, end-to-end encryption by default, the ability to create private and public...
1 week agoOleksandr Glushchenko, Pavlo Belousov: MAХ messenger – delete it IMMEDIATELY!
Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...
1 week agoHow the U.S. Ambassador Was Spied on for 7 Years with an Invisible Bug—and Its Surprising Link to Electronic Music
In 1945, Soviet spies scored a major victory over their American colleagues: they managed to...
1 week agoAuthenticator Pro: review of two-factor authentication app for Android
"There are quite a few apps for two-factor authentication. The most popular one, Google Authenticator,...
1 week agoTips from Nadiyno.org: what personal information should never be disclosed online
Useful tips from the Nadiyno.org digital assistance hotline. Pavlo Bilousov, the hotline's technical expert, answers...
1 week agoThe first world cyber war: confession of a Ukrainian hacker
Aleksandr Glushchenko's guest is a hacker from Kharkov, cyber dictator, author of the Нackyourmom channel...
1 week agoDonate Safely! How Security Forces Track Crypto
"Recently, the FSB announced that it had detained a Russian accused of treason for transferring...
1 week agoBig Brother. History of surveillance
"Holmes versus Moriarty. Bastrykin versus a magnifying glass. Aristotle versus a press with spikes. The...
1 week agoThe most honest review of the MAX messenger
In this video, "The First Department" examines how secure the MAX messenger is. We find...
1 week agoTella: How to encrypt and hide files on Android and iPhone
"In today's world, where digital security does not tolerate negligence, it is invaluable to have...
2 weeks agoWhat is the danger of the Russian app store RuStore?
When you buy a phone, it already has many applications installed. Games, social networks, manufacturer's...
2 weeks agoTails: secure OS on Debian Linux. Portable version
"Tails is a great solution if you need to work on someone else's computer and...
2 weeks agoChrome is out of Fashion? Here are the Top 10 More Interesting Options!
"Google Chrome holds 66% of the browser market, but should you trust it? In this...
2 weeks agoCybersecurity cert prep: Lab 30: SQL Injection — Reveal hidden items with Python automation
"Getting ready to obtain a cybersecurity certification together by solving lab exercises. The labs used...
2 weeks agoEvgeny Vladimirov: Ukraine is able to organize CTF tournaments with tens of thousands of participants
eQtalk is an original project of the eQtv channel. The guest of the issue is...
2 weeks ago