BREAKING NEWS

The attack on Berisha/ The journalist reveals who is the person who stopped his rape of Gert Shehut

The attack on Berisha/ The journalist reveals who is the person who stopped his
x
BREAKING NEWS

Shemsi Prençi surprises with the statement: Even if they invite me today as a leader in the police, I do not accept. Here is the strong reason

Shemsi Prençi surprises with the statement: Even if they invite me today
x
BREAKING NEWS

The attack on Sali Berisha in the protest, the journalist casts strong doubts: Gerti Shehu may be recruited by intelligence services

The attack on Sali Berisha in the protest, the journalist casts strong doubts:
x
BREAKING NEWS

The explosions in the north of Kosovo, the immediate response of the police comes

The explosions in the north of Kosovo, the immediate response of the police
x
BREAKING NEWS

Have security cameras been seized in PD? The journalist discloses hard details and reveals the last moves of the prosecution

Have security cameras been seized in PD? The journalist discloses hard details
x
BREAKING NEWS

Attacked by the 31-year-old, Breçani discovers Berisha's order for the aggressor

Attacked by the 31-year-old, Breçani discovers Berisha's order for
x
BREAKING NEWS

Neutralized Berisha's aggressor, Erzen Breçani severely criticizes the authorities: The investigation into the attack on Berisha should start sooner, the police should...

Neutralized Berisha's aggressor, Erzen Breçani severely criticizes
x
BREAKING NEWS

The situation in the north of Kosovo is tense, a powerful explosion in Mitrovica, it is suspected that...

The situation in the north of Kosovo is tense, a powerful explosion in
x

Aktualitet

Data release/ Computer network expert reveals details of how hackers worked in the system: Here's when we found out

Data release/ Computer network expert reveals details of how hackers worked in

Erion Demiri, Engineer and computer network expert, spoke in a Skype connection with the show "Open" regarding cyber attacks.

He said that we can have data leaks, but also data changes and what the hackers have done in the system can only be said by the institutions.

"All the data that is received and that is continuously received, goes into a tab, so they have a tab of what they are doing.

Once we knew, we knew the moment they showed up on our computers. They decided to appear, and when they did, they had finished the work they intended to do. We have two things, we have data leakage, but there may be a change and only the institutions can say that", he said.

 

Most read