BIF-2018 to Take Place in Belgorod on September 15

BIF-2018 will bring together 1000+ active players of the IT industry
29 August 2018   1493

The Second Forum of Information Technologies "BIF-2018" will be held in Belgorod on September 15. Representatives of the IT community will gather again in the Belgorod Philharmonic to discuss prospects for the development of the IT industry and modern trends in digital solutions.

BIF-2018BIF-2018

This year the forum will bring together over 1000 participants - entrepreneurs, IT specialists, potential investors, marketers, PR specialists, freelancers, bloggers, students and anyone interested in developing the IT environment of the region. Everyone will get a lot of useful experience from leading representatives of IT companies of the country. Participants will also be able to get to know one another, as well as talk with speakers in an informal atmosphere.

BIF-2017BIF-2017

After the educational program, a symphony concert is planned, as well as an afterparty in one of the city's restaurants.

Belgorod IT-forum will be held as a conference with the following topics:

  • frontend-, backend-, mobile-development, product testing;
  • digital, content marketing;
  • interface and usability;
  • team management, agile.

Experts of the forum are the representatives of such companies as VK, Mail.ru, NGINX, ScrumTrek, Tinkoff.ru, Dodo Pizza, IKRA, Avito, Sports.ru, Netology-group, Rostelecom, and the Ministry of Culture, The Ministry of Digital Development, Communications and Mass Media and many others.

The event will begin at 10:00 with a panel discussion, after which the speeches will start in five sections.

More information:

  • Website
  • ‎Vkontakte

Supra Smart Cloud TV to be Hacked

Now hacker can replace video being watched with own content
04 June 2019   309

A vulnerability has been identified on the Supra Smart Cloud TV (CVE-2019-12477). It makes possible to replace the transmission currently being watched for the content of the attacker. As an example, the output of a bogus emergency warning is shown.

To attack, just send a specially designed network request that does not require authentication. In particular, hacker can contact the handler "/ remote / media_control? Action = setUri & uri =" by specifying the URL of the m3u8 file with the video parameters, for example "http://192.168.1.155/remote/media_control?action=setUri&uri=http://attacker .com / fake_broadcast_message.m3u8 ".

In most cases, access to the IP address of the TV is limited to the internal network, but since the request is sent via HTTP, it is possible to use methods to access internal resources when the user opens a specially designed external page (for example, under the request of a picture or using the DNS rebinding method).