ITKarma

All flows

You were fired from work. Survival instruction

I am not hr and not a lawyer. I am an ordinary worker who has faced different situations and am learning to deal with them. I hope this text and my experience will help you...

My ten years in game dev

Hello! My name is Nico Tuason, I am an indie game developer from the Philippines. This year marks ten years from the moment I began my journey in game dev...

Without "Hello world!" and in IT?

Petrovich was an old experienced CTO - he still remembered punch cards, and the number of programming languages ​​that he knew was approximately equal to the number of languages ​​that had sunk into oblivion of natural selection i...

Calls do not solve any problems. They are needed only by people who cannot write code.

The very first working phoning in my life aroused complex feelings. On the one hand, it was pretty cool - I spoke with the Americans from Microsoft as an equal member of the team, they listened to me, and it raised my self-esteem...

Blockchain and standard databases. Is there any difference

This time I want to talk about what I see the differences between the blockchain and conventional database systems. Of course I don’t think that I found the answer, consider it my thoughts...

Podcast: “I like to investigate attacks on quantum key distribution systems”

This is the third release of our new podcast. Anton Kozubov, leader of the theoretical group laboratories of quantum processes and measurements of ITMO University. We discussed his work, projects and industry specifics...

Personal data, rights of PD subjects

We all use the phone, go to work or for interviews, use bank cards or just travel around the Internet. Often without even thinking about the fact that we leave a trace of personal data...

Bug bounty Ozon questions and answers

We launched a public bug bounty program on HackerOne - now you can get a reward for the vulnerabilities found on the Ozon website, and at the same time help the company, the service of which is used by friends, acquaintances and r...

Security Week 28: vulnerability in powerline extender

Don't you think that there has been less research on vulnerabilities in home routers? It does not seem to us, and recently poorly protected devices that transmit data via electrical wires have been added to routers...

Mobile device and application security: five popular attack scenarios and security methods

Image: Unsplash Modern mobile devices are very complex, and this gives attackers the ability to conduct attacks. Literally everything can be used to hack your smartphone - from Wi-Fi and Bluetooth to speaker and microphone...

5 stages of inevitability of adoption of ISO/IEC 27001 certification. Bargain

The third stage of emotional response to changes is bargaining. Having dealt with our anger and emotional component, we began to think about what really needs to be done to ensure that everything worked for us...

(Without) smart devices: top 10 OWASP IoT vulnerabilities

It is no secret that the implementation of security mechanisms for IoT devices is far from perfect. Known smart device vulnerability categories are well described in the Top IoT Vulnerabilities 2018...

IS outsourcing, internal security. Where to go to the customer

Today we decided to talk about whether companies are ready to outsource internal security. For many years it was believed that no. But the situation is changing...

Incident Response: What SOC owes you

You can know little about SOC, but it will still be intuitively clear that in his work two things are most important: identifying incidents and responding to them...

Email protection from Check Point. MTA Click-Time URL Protection

It's no secret that mail and mail attachments are one of the main attack vectors...

We study obsessive and secretive programs that track employee actions

Coronavirus has forced millions of people to work from home, and now an extensive group of companies is obsessively advertising their employer programs to employers across the United States...

Modern Android devices are safe enough and that’s why

Speaking about the advantages of the Android platform, most users usually call customizability, a variety of devices and flexible prices. And for some reason, there is no question of security...

Institute of Cybersecurity established at St. Petersburg Polytech

Every year, NeoQUEST helps us, our fellow security students and students Peter the Great St. Petersburg Polytechnic University...

Looking for vulnerabilities in TikTok with OSINT

Introduction TikTok is one of the most popular applications for viewing mobile video. It has 800 million registered users. Users create content using filters, music, effects...

How to check IPS? Infection Monkey vs Check Point

Three years ago, we published the article “ Online tools for the simplest Pentest ”...