The companies violated article 76 of the Treaty on the Eurasian Economic Union on general competition rules.
The Eurasian Economic Commission received statements from the Association of Copyright Holders, Licensors and Licensees for the Protection of Copyright on the Internet (AZAPI) about...
Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system.
The UK government is assessing the possible consequences of a "technical error", due to which 150 thousand records were deleted from police databases, including fingerprints of...
The vulnerability appeared in the version of Windows 10 (build 1803) and continues to exist in the latest version.
A vulnerability in Microsoft Windows 10 allows attackers to damage an NTFS-formatted hard drive with a single-line command. A single-line file can be hidden inside a Windows...
Popular messenger WhatsApp threatens users with account blocking for refusing to accept the new terms of use of the application.
On February 8, the popular WhatsApp messenger will enter into force new Terms of Use. Developers are already preparing for the transition and will soon start...
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10.
image
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
The database contains 1.3 million records of registered users.
According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru.
According to the...
After 2012, Apple loosened the protection of devices and began to apply strong encryption to less data.
A group of cryptography experts has offered a theory about why law enforcement is still able to hack the iPhone, despite the constant iOS fixes and security levels of the mobile device...
The price for a fully managed DDoS attack is $165 on the darknet.
image
Cybersecurity researchers at Flashpoint have reported rising prices for access to RDP servers, stolen payment card data and a "DDoS-as-a-service" business model on underground forums and trading platforms.
"As a result of...
Critical vulnerabilities were discovered in the main network library that provides the functionality of Valve online games, the exploitation of which allowed attackers to remotely cause video games to crash and even take control of affected third-party game servers to execute arbitrary code...