Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Search
MATERIALS BY TAGS: information war
Найдено статей: 287
The hole in the CPU: all the error that allows to steal passwords from almost any computer and smartphone

The researchers found the security hole, which is contained in most modern processors, computers, laptops and even smartphones. Tell all that is known about vulnerabilities Meltdown and the Spectre, and how to live with them.

07-01-2018 admin 2332 0

If 2017 was the "full version" that will bring 2018?

History, which was earlier seen only in suspense novels have become a reality in the world of cybersecurity. That is the lesson of the last year.

01-01-2018 admin 2604 0

Rastorguev S. P. "Practical aspects of the theory of nested spaces"

The material in this book – the chapters of unfinished books in the direction that Sergey Rastorguev did in the last years of his life. What can be the best memory for a scientist who devoted his life to science? Only edition of all his works, which have not been published, on which the author worked in the last weeks and days allotted to his earthly life...

20-12-2017 admin 3432 0

Artificial intelligence transformerait information security, but do not expect instant changes

Though artificial intelligence and appeared as far back as the 50s, to this day it is one of the most talked about, interesting and controversial technologies in the world. Artificial intelligence is a universal term that describes a set of technologies that allow computer to perform various functions like man, for example, the processing and speech synthesis, natural language processing, computer vision.

15-12-2017 admin 2137 0

The basics of information security in 2017

In today's world it is difficult to keep any information secret. Especially if it is of value to someone and you need to convey. No matter what your reasons for concealing certain information, this article will cover the basic methods and software tools to keep the information confidential.

13-12-2017 admin 2673 0

Conspiracy theory Russian-Venezuelan hackers: the enemy simulacrum

Unit of the European Union, analysing Russian propaganda, have not found a single case of interference in Catalan a subject, contrary to the assertions by the government and close to it the media.

05-12-2017 admin 2411 0

The fake news sites are leased

The news, which many are published every day — to put it mildly, not always true. In some cases, this is anecdotal, which can be used as a tool to achieve a variety of purposes, political and commercial. This tool is used by both individuals and large corporations.

27-11-2017 admin 2520 0

Outreach activities of the terrorist organization ISIL: the basic ways of counteraction

Studying various Islamic groups, their activities and methods of propaganda work, external and internal orientation, come to the conclusion that they affect human consciousness. Particular impact such work has on a believer. In this regard, it should be said that all known to us in the East, terrorist organizations have vivid religious orientation. And this despite the attempt of Western countries headed by USA to give them some "secular" sound [2]. However, these organizations did not hide its religious nature. This work is separately dedicated to the most influential, massive and rich world of the terrorist group – Islamic state of Iraq and the Levant (hereafter ISIL). The organization skillfully and effectively apply the methods and techniques of propaganda, drawing into its ranks all new and new adherents.

14-11-2017 admin 10749 0

Surkov spoke about the "crisis of hypocrisy" and the emergence of the King of the West
Проект: Revolution of the XXI century: nonviolent methods

In the result of the obsolescence of earlier methods of cheating companies, the West is now experiencing a crisis that may end in a revolution, a major war or the advent of the "strong hand", says assistant to the President in an article for RT.

07-11-2017 admin 3813 0

Half of all countries lack a strategy for cyber security: UN Report

The international telecommunication Union (ITU) has presented the Global Cybersecurity Index (GCI) 2017 Wednesday, June 5. This was a continuation of the first version, which the organization launched in 2014. A report on the commitment of the member States of the ITU cybersecurity, hoping to force them to improve their cybersecurity and to increase the awareness for the need to run bilateral, multilateral and international cooperation.

09-10-2017 admin 2302 0

Возрастное ограничение