BIF-2018 to Take Place in Belgorod on September 15

BIF-2018 will bring together 1000+ active players of the IT industry
29 August 2018   976

The Second Forum of Information Technologies "BIF-2018" will be held in Belgorod on September 15. Representatives of the IT community will gather again in the Belgorod Philharmonic to discuss prospects for the development of the IT industry and modern trends in digital solutions.


This year the forum will bring together over 1000 participants - entrepreneurs, IT specialists, potential investors, marketers, PR specialists, freelancers, bloggers, students and anyone interested in developing the IT environment of the region. Everyone will get a lot of useful experience from leading representatives of IT companies of the country. Participants will also be able to get to know one another, as well as talk with speakers in an informal atmosphere.


After the educational program, a symphony concert is planned, as well as an afterparty in one of the city's restaurants.

Belgorod IT-forum will be held as a conference with the following topics:

  • frontend-, backend-, mobile-development, product testing;
  • digital, content marketing;
  • interface and usability;
  • team management, agile.

Experts of the forum are the representatives of such companies as VK,, NGINX, ScrumTrek,, Dodo Pizza, IKRA, Avito,, Netology-group, Rostelecom, and the Ministry of Culture, The Ministry of Digital Development, Communications and Mass Media and many others.

The event will begin at 10:00 with a panel discussion, after which the speeches will start in five sections.

More information:

  • Website
  • ‎Vkontakte

Third Party Apps Could Read Twitter Messaging

According to the company, no one used this vulnerability and the issues is now solved
18 December 2018   690

Until the beginning of December, third-party applications could access Twitter private messages. According to the company, no one took advantage of this vulnerability. Terence Eden, who found it, was paid almost $ 3,000 under the Bug Bounty program.

In 2013, there was a leak of keys to the Twitter API - so applications could access the interface bypassing the social network. To protect users, Twitter implemented an application authorization mechanism through predefined addresses (Callback URL), but it didn’t suit everyone.

Applications that do not support Callback URLs could authenticate using PIN codes. With this authorization, a window pops up that lists which data the user opens to access. The window did not request access to private messages, but in fact the application received it.

On December 6, Twitter reported that it had solved the problem. Judging by the statement of the company on the HackerOne website, no one had time to take advantage of this vulnerability.

This is not the first social network security error related to the API. In September, Twitter discovered a bug in AAAPI (Account Activity API): the system sent a copy of the user's personal message to a random recipient.