How data flows from spyware applications

Hello! I am Nikolay Berko. I work in Smart Line Inc. on the DeviceLock family of products. I am engaged in the development of specifications, participate in the development of the architecture of new components, I like to test new features. Here I will write about DLP and DeviceLock, in particular, as well as interesting stories from the world of infobase for me.
 
 
Here, for example, a small selection of stories about how data leaks from spyware applications.
 
3r311.
 
A huge number of different software that collects everything that the hands of developers can reach, creates a real problem ...
+ 0 -

Keepers of the Internet

3r3161. “Some people call us“ Plyushins ”- I like to say that we are archivists.” 3-333130. 3r3162.
 

Wayback Machine director Mark Graham outlined the scale of the beloved archive


 
3r314.
 
 
View the Wayback Machine at the Online News Association 2018 3r3-3303 conference.
 
 
Austin, Texas. No matter how much the subscriber services would like to convince you of this, but not everything can be found on Amazon or Netflix. Want, for example, read book ...
[/h]
+ 0 -

Pavel 2.0: Reptiloid Consultant on JS, node.js with Sockets and Telephony

Pavel 2.0: Reptiloid Consultant on JS, node.js with Sockets and TelephonySo our INTERCOM’18 has died down, with preference and business cases. As usual, the entrance to the conference was paid: anyone could buy tickets for the TimePad at full price, or get a discount from a reptilian consultant right on the site . Last year, it worked like a familiar callback: you leave the phone in a special form, Paul calls you in a minute and asks questions; the more correct answers, the higher the discount. This time we decided to change the mechanics, making it more difficult both technically and in terms of issues. Under the cut - Pavlik's guts 2.? with the current node ...
+ 0 -

Counterfeiting of charts, substitution of quotes and price manipulation: how to crack trading applications

Counterfeiting of charts, substitution of quotes and price manipulation: how to crack trading applications 3r3384.  3r3394. 3r3384.  3r3394. 3r311. Image:
Unsplash
3r314. 3r3384.  3r3394. 3r3384.  3r3394. Positive Technologies experts conducted 3r3193. security analysis for trading applications
- trading terminals that allow you to buy and sell stocks, bonds, futures, currency and other assets. According to the study, in 61% of applications it is possible to obtain unauthorized access to personal accounts, in 33% - conducting financial transactions on behalf of other users without access to a personal account, in 17% - replacing the displayed quotes. Such attacks can cause a change in prices in the market ...
+ 0 -

mmWave in smartphones: how Qualcomm made the impossible possible

mmWave in smartphones: how Qualcomm made the impossible possible 3r3122.  
3r3122.  
Qualcomm recently unveiled the world's first fully integrated 5G NR (mmWave) and sub-6 GHz RF modules for mobile devices. Until now, mmWave signals have not been used for mobile communication due to numerous technical difficulties. Therefore, many in the industry were convinced that this is simply impossible. How the difficulties were overcome and what effect the millimeter range will have on 5G - in our review below. 3r3122.  
3r311. 3r3119. 3r3122.  
3r3122.  
By 202? mobile data transmission traffic around the world will grow 30 times compared to 2014 and will be ...
+ 0 -

With the release of Chrome 70 thousand sites protected by Symantec certificates will be untrusted

 
3r3-31.
With the release of Chrome 70 thousand sites protected by Symantec certificates will be untrusted 3r33939.
 
Recently, Google announced r3r385. about termination of trust to all SSL certificates issued before December ? 2017 by Symantec, Thawte, GeoTrust and RapidSSL certification centers. The changes will take effect on October 16 of this year with the release of the new anniversary browser Google Chrome 70.
 
3r311.

 
3r3633. Apparently, some companies have not received notification of these changes 3r3828.  
[/b]
 
Distrust of all certificates of the Symantec family means the last stage of the three-step process, initiated by Google and Mozilla, which will completely rid the Internet ...
+ 0 -

Is it possible to close back open source code?

Is it possible to close back open source code? 3r3128.  
3r3128.  
This concept seems fairly simple to anyone who has worked with open source for some time: a project once released as open source remains open forever. Of course, the developer may decide that future versions of the project will be closed, and sometimes this happens, but what has already been released can not be recalled. The internet does not have a “delete” button; having published my code, and giving millions of people the potential to download it, it will not work to push the gin back into the bottle. 3r3128.  
3r3128.  
But what about valid reasons? What if the project turns into ...
+ 0 -

SAP Data Management Suite as a complex for working with Big Data in companies

This year, at the SAPPHIRE NOW conference, we showed a new set of solutions for working with big data - the SAP HANA Data Management Suite. Previously, many of our materials featured the name SAP Business Suite - today we will try to explain a little what Data Management Suite is and why it appeared at all in the SAP solution portfolio. 3r33130.  
3r33130.  
If earlier, when developing solutions for enterprise resource management, SAP focused on the implementation of standard business processes (this was how the Business Suite was created), now the focus has shifted to data management. This requires ...
+ 0 -

Fiasco. The story of one homemade IoT

Fiasco. The story of one homemade IoT 3r33479. 3r3-31. Most articles are written according to the principle “I /we did it /and look how cool it is!”. The same publication is dedicated to a failed project. Welcome to the category
 3r33479. Development of smart devices on the example of a floor heating controller on ESP8266
 3r33479.

Start from a distance


 3r33479.
I live in a small house that is built according to my project. Layout - eurotreshka, corridor, kitchen-living room on the first floor, bathroom, children's room and bedroom on the second. From non-standard - walls arbolit, the foundation of UWB, heating only TP...[/h]
+ 0 -

Facts and hypotheses about the accident "Union MS-10"

+ 0 -