Experts of the company Veracode submitted a report, on which work took them one and a half years. During this time, experts have studied more than 200 000 different applications trying to determine how the situation with security in the sphere of dev..
December 8, 2015 meeting of the Department of Information and cyber security is devoted to the following issues:
1) Preparation of teaching methods for students NNIZI.
2) The situation regarding implementation of research, which is fixed by the..
The annual conference of Ukrainian Information Security Group gather in the capital of Ukraine hundreds of experts in information security of Ukraine and the world to discuss the most pressing problems of the industry.
NATO Cyber Defence Centre published a book on cyber war between Ukraine and Russia under the name of Cyber War in Perspective: Russian Aggression against Ukraine.
The book, created by scientists and practitioners, experts, an analysis of the curre..
Kevin Mitnick, the founder of social engineering, belong to the golden words:
Social Engineer planned to get the project (the source) of your new product for 2 months before release.
What's to stop him?
Your firewall? No.
Powerful sys..
Computer Security Day is celebrated on November 30 1988. This year is no accident that became the ancestor of the festival, during this year was recorded the first mass epidemic of worm, known by the name of its founder - Morris. It was then that exp..
November 24, 2015 meeting of the Department of Information and cyber security is devoted to the following issues:
1) Work student clubs;
2) Continuing vocational guidance department staff;
3) The situation regarding implementation of researc..
17 and 19 November 2015 were conducted lectures and practical training sessions conducted by a specially invited representative from the company SearchInform. Classes were aimed at improving knowledge of the software system Contour Information Se..