Tag: phone number database

Else namely a team create by one of the leading analysts of the Ministry of Industry and Trade. In when Russia receive the first sanctions from the world due to the annexation of Crimea. We are provide with information about which goods will significantly rise in price in the near future. We buy these goods…

RAdds a representative of Alfa-Bank. According to Dvoryansky the decrease in the number of calls from intruders and the transition towards phishing activity is associate among other things with the development and widespread use of anti-fraud solutions. by banks and telecom operators as well as with the greater effectiveness of phishing for intruders. The success…

The backdrop of sanctions and restrictions Large banks assesse how the schemes and intensity of fraudulent attacks on customers have change in March against the backdrop of the imposition of sanctions and restrictions on certain banking operations. The VTB representative notes that the situation in the banking market has change significantly in February-March this year…

OF the key characteristics of cloud computing. In most traditional data centers Engineers’ access to servers is controlle at the physical level; in cloud environments they work via the Internet. Delimiting access control and ensuring transparency of changes at the system level is . one of the main criteria for protection.  Security and fintech Alexander…

MSS market is growing at an average of % per year. According to Ruslan Kosarim one of the most important market development trends is controlle detection and response. The nee for MDR or SOC services due to the development of malware and the increase in the scale of attacks is growing and will continue to…

Analytics and improves its efficiency makes it possible to block new malicious code almost instantly and spees up the sandbox. Another endpoint mitigation technology is FortieR response automation. It can detect malware not only at the penetration stage but also after it has settle in the system. The results of independent tests showe that only…

LAN test results Test results are disappointing. In % of cases potentially dangerous resources are not blocke; outdate vulnerable solutions are use to filter traffic. The share of parasitic traffic reaches % including % – torrents and PP networks .% – advertising .% – entertainment news .% – cartoons .% – computer games .% –…

A Soft-liner Company According to him the danger may lie in the fact that users will start downloading applications not from the official websites of banks but from external. Resources like the Top Android Applications. Unofficial file hosting services will also appear on which it will allegely be possible to download a fully functioning banking…

Head of Consulting and Audit Department of Angara Security Alexander Khonin on standardization in IT Standardization is by default an important process as it allows you to regulate the rules of the game. We see that many new documents regarding information security have been release lately. Given the growing role of information security this is…

Tools integrate security tools etc. This trend will also be facilitate by initiatives from relevant departments and the professional community such as the creation of a Russian software marketplace the consolidation of software and hardware registries grants for the implementation domestic IT solutions. Despite the conflicting assessments of experts we see OpenSource as one of…