A cartoon intro to DNS over HTTPS

A cartoon intro to DNS over HTTPS

News
DNS queries can leak a lot of personal information related to your Internet browsing. Encrypting your DNS traffic via HTTPS (called 'DoH' - 'DNS over HTTPS') is one mitigation, and Mozilla said this week that it is adding DoH support into its browser. Over on the Mozilla Hacks blog, Lin Clark has put together some cartoon explainers going over what HTTPS and DNS are, what DoH is and how it works, and why it will help secure your browsing. If you're looking for a technical explainer that is still accessible for a less tech-savvy reader, check it out. Source: moz://a HACKS
Read More
Vice President of the Ukrainian Academy of Cyber Security has taken part in ABA Section of International Law in New York

Vice President of the Ukrainian Academy of Cyber Security has taken part in ABA Section of International Law in New York

News
Today the Vice President of the Ukrainian Academy of Cyber Security, Andrii Paziuk has taken part in American Bar Association Section of International Law which was held in Grand Hyatt, New York. Panelists and other conferees discussed the following issues - Big Data, Artificial Intelligence, Privacy and Personal Data. The video of this section is available by the link.    
Read More

NGO “Ukrainian Academy of Cyber Security” successfully organized training for representatives of cyberpolice

News
The Ukrainian Academy of Cyber Security, together with the Internet Corporation for Assigned Names and Numbers (ICANN), conducted a training for representatives of the Department of Cyber Police of the National Police of Ukraine. On April 13, 2018, a training session was organized and conducted at the Department of Cyber Police of the National Police of Ukraine with the participation of the Department's specialists and the representative of the ICANN's specialized unit, Carlos Alvarez, who is directly involved in the investigation of computer incidents in the DNS area. This training is a continuation of Carlos Alvarez's lecture which held in November at the National Academy of Internal Affairs about the role and tasks of ICANN and had a more practical direction to improve the skills of specialists during working with incidents…
Read More
Representatives of Ukraine and Great Britain held consultations in London on strengthening cooperation in the field of cyber security.

Representatives of Ukraine and Great Britain held consultations in London on strengthening cooperation in the field of cyber security.

News
The press-service of the Ministry of Foreign Affairs of Ukraine in Twitter reports. "Ukraine strengthens interagency cooperation with Great Britain in the area of countering cyber threats. The first consultations between Ukraine and Great Britain began today in London," the statement reads.   Source: UKRINFORM
Read More
The first situational center for providing cybersecurity of the SSU was launched in Kiev

The first situational center for providing cybersecurity of the SSU was launched in Kiev

News
The Security Service of Ukraine opened the first situational center for cyber security. "This is the first situational center, we have already launched it into work, and the second situational center, I hope, will soon be launched by the State Service of Special Communications and Information Protection of Ukraine ... In the long term ... such situational centers will be opened in other agencies such as Ministry of Internal Affairs and State Emergency Service of Ukraine that will interact with our situational center and the situation center of the State Service of Special Communications and Information Protection of Ukraine", - said Vasyl Hrytsak, the head of the Security Service of Ukraine, during the opening of the situational center for cyber security in Kyiv. The head of the Security Service of Ukraine explained…
Read More
Malware Embedded in CCleaner Tool Puts Millions at Risk

Malware Embedded in CCleaner Tool Puts Millions at Risk

News
Malicious code has been discovered in two versions of Piniform's CCleaner housekeeping utility, the company disclosed on Monday. Piniform is owned by Avast, whose security products are used by more than 400 million people. The malware infecting CCleaner could give hackers control over the devices of more than 2 million users. CCleaner is designed to rid computers and mobile phones of junk, such as unwanted applications and advertising cookies. Two versions of the program were modified illegally before they were released to the public, Piniform said. However, the threat has been neutralized, according to Piniform Vice President Paul Yung, who explained that the rogue server the hackers used to control the code is down, and other servers no longer are in the attackers' control. All users who downloaded the infected version…
Read More
Hakaton

Hakaton

News
This coming Saturday, developers from all over London will come together to participate in “Can you hack it?” – a hackathon hosted by Avanade and sponsored by Xamarin, a company involved in mobile cross-platform technology (iOS, Windows 8 and Android). Supported by tech firms, this collaborative challenge will provide London’s technology talent with an opportunity to work together on mobile application development projects. However, unlike most hackathons, this event was organized to raise money to help support The Prince’s Trust. The Prince’s Trust give vulnerable young people the practical and financial support needed to stabilize their lives, develop self-esteem and gain valuable skills for work. Part of an internal Avanade competition – called Zero2Hero – where Avanade teams compete to raise the most money for the Prince’s Trust, this hackathon is being led by…
Read More
5 Stages Of A Hackathon

5 Stages Of A Hackathon

News
About one month ago on April 1 it was about 9 p.m. on a Friday night, and I was already fast asleep. I have a perfectly reasonable explanation for why sleeping so early. I participated in my first hackathon! So let's rewind to about 30 hours ago and look at all the ups and downs of this 26 hour event. 1. Must be something in the atmosphere March 31 - 3:00pm. Click here to see a quick walk-around of Lehigh's first Hackathon. The energy of the environment is very unique in the fact that you can almost feel the creativity and innovation flowing through the air. As you walk through the large, open room you can see all the teams working furiously at their desks and whiteboards. Stepping into this atmosphere was…
Read More
RESEARCH HACKATHON

RESEARCH HACKATHON

Events — Cybersecurity
X-Culture is collecting huge amounts of data. We are tracking over 2,000 variables: longitudinal, multi-level, multi-source, multi-method. Just about anything related to international teams and virtual collaboration – we measure it. We have dozens of papers in development based on the data, but there are definitely many more good publications hidden in our database. Additionally, I have been collecting datasets as part of the “mega-analysis” study and have now amassed over 100 original datasets related to measurement of culture and cross-cultural team dynamics. This project is now morphing into the WikiDemix.org data sharing platform. It is expected that this crowdsourcing approach will allow us to create a huge depository of data related to various International Business topics and beyond. The problem is that even though over 480 IB professors have participated in…
Read More