Post-quantum protection for videoconferencing is being tested in Russia
The DION service from T1 Group has become the first domestic video conferencing system capable of resisting cyber attacks using quantum computers at the software level.
The test implementation resulted in the first video communication session protected from cyber threats using post-quantum encryption algorithms. The solution provider was QApp, a domestic developer of complex cybersecurity products. During the implementation of the pilot project, the parties jointly integrated a new QApp product, a post-quantum VPN, into the DION video conferencing service, which made it possible to protect the video data transmission channel from attacks using both classical and quantum computers.
Along with the possibility of video calls from computers and mobile devices based on the Android OS without loss of video and sound quality, the significant geographical extent of the channel has become a feature of the software product. So, the conference participants managed to provide secure data exchange at a distance of 1800 km without the use of additional equipment.
Ex-top manager of Merlion Boris Levin founded the company “Safety and Law”,
which, in cooperation with SearchInform and InfoWatch, will provide services in the cybersecurity area: it will detect insiders and investigate data leaks.
According to Kommersant, Security and Law LLC was registered at the end of 2022. The company will become a distributor of SearchInform and InfoWatch solutions, including DLP systems.
Mintsifra launches bug bounty –
a project to search for vulnerabilities on the Gosuslugi portal and other e-government resources.
The program will take place in several stages. At the first stage, independent researchers will check the Gosuslugi portal and ESIA, and at the next stages the list of resources will be expanded and the conditions updated. For successful work, baghunters can receive up to a million rubles.
According to Kaspersky Lab,
in January 2023, the number of attempts by users around the world to go to phishing resources mimicking Google services almost tripled compared to December 2022 – by 189%.
In early February, the trend continues. Phishing pages are often created to lure out credentials that can give attackers access to many user accounts in the Google ecosystem, such as YouTube, at once.
An example of a fraudulent scheme faced by users in Russia and abroad looks like this: attackers gain access to the account of a popular blogger, change his background and profile avatar, and then start broadcasting his video.
One of these entries, which drew the attention of Kaspersky Lab experts, was dedicated to the topic of cryptocurrencies and was allegedly made on behalf of Elon Musk. The attackers tried to convince viewers to follow the QR code shown on the screen. In particular, behind one of these links was a scam resource that allegedly hosted a cryptocurrency raffle. On such sites, users risk losing money and personal data.