February 24, 2016 meeting of the Department of Information and cyber security dedicated to the following issues:
1) Work student clubs;
2) The situation regarding the implementation of research, which is assigned to the department;
3) Contin..
19 February, 2016 about 16:00 «Day of the unclosed doors» took place in the State university of telecommunications.
The employees of Information security sytems department showed to the university entrants educational laboratories, in ..
Due to a collaboration with Private enterprise «RIAS» the material base of Information security sytems department was filled up by new devices.
Emitter acoustic «РІАС-2ВА»
Emitter piezoelectric «РІАС-2ВП»
..
The Verkhovna Rada of Ukraine September 16, 2015 and adopted the Law of Ukraine On ratification of International Labor Organization Convention concerning Basic Aims and Standards of Social Policy number 117» (№ 0055). For the corresponding bill..
The President of Ukraine has registered in the Verkhovna Rada a draft law On ratification of the ILO Convention on minimum standards of social security number 102 (hereinafter - the Convention)» (number 0091).
The bill provides for the provi..
February 24th, 2016 a meeting of the Department of Security of life and safety in the course of which the following issues were discussed:
1) The beginning of spring semester 2015-2016 school year.
2) Career guidance staff of the Department.
..
February 16, 2016 meeting of the Department of Information and cyber security is devoted to the following issues:
1) Work student clubs;
2) The attendance of students;
3) The situation regarding implementation of research, which is fixed by ..
Researchers at Palo Alto Networks found a backdoor that can steal from Skype video, audio, messages and screenshots.
According to experts, the malware T9000, made great efforts to remain undetected. It belongs to the family of Plat1 and used in ph..
Experts Heimdal Security companies have discovered a new malware that attacks Android devices. Malvar not only apply non-standard way: by means of SMS and MMS-messages, but also able to get root-access to the device, to steal financial information an..