HT Tech

Gadgets 360

GizBot

GSMArena

TmoNews

ZDNet

Friday, April 24, 2020

Skoda has patented the name for the new compact crossover

The Skoda Vision IN concept, introduced earlier this year, can get the simple and uncomplicated name Kliq. According to Autonews of the Day, a patent for a trademark with that name appeared in the base of the Ministry of Industry and Trade of India.

There is no doubt that Kliq will be called the crossover - the names of all Skoda crossovers begin with the letter K and end with Q: Kodiaq, Karoq and Kamiq. In addition, the new name perfectly reflects the philosophy of the new product - maximum digitalization.




The Skoda Kliq will probably be based on the modular MQB platform, or rather, its budget modification with the A0 prefix, which will also build the new Volkswagen Nivus coupe crossover.


The engine range will be presented by small-volume TSI petrol turbo engines of 1.0 and 1.5 liters with a capacity of 110 and 150 hp. respectively. The first will work in tandem with a six-speed "mechanics" or a six-speed "automatic", the second - only with a seven-speed "robot". The drive, as prescribed by the budget segment, will only be front-wheel drive.

The first Klika market will be India, and production will be established there. The start of sales of the SUV is scheduled for mid-2021.

Huawei has released its replacement for Google maps

Huawei has released its replacement for Google maps. It can be downloaded from the App Gallery app store.

Last year, Huawei lost the ability to install Google services (GMS) on their smartphones. Since then, the company has been trying to offer its alternative to various applications from the specified package. Now the turn has come for the analogue of Google Maps - Here WeGo Maps.

أصدرت Huawei استبدالها لخرائط Google
The application offers offline maps, as well as various options, including route building. The service operates in more than 100 countries and covers over 1300 cities.

Recall that in May last year, Chinese Huawei was on the "black list" of the US Department of Commerce, so it can not fully conduct business with American companies.

Android 11 will provide users with new features

سيزود Android 11 المستخدمين بمميزات جديدة

The third preview version of Android 11 is suitable for both developers and ordinary users. However, the former will find in the new operating system an important Wi-Fi or Wireless Debugging debugging feature.

Now developers have got a wireless ADB connection for debugging applications. Ordinary users are unlikely to appreciate the significance of the function, but for professionals it is a useful tool through which applications are installed and debugged.

Using the ADB Incremental function, the developer will quickly install files larger than 2 GB on a smartphone through a PC. The option to display detailed information about crashes and reasons for closing applications monitors memory errors. Users can quickly create a screenshot and share it online.

LG Velvet will be presented on May 7

سيتم تقديم LG Velvet في 7 مايو


As you know, LG has changed its policy for the production of new smartphones . Recently, the company promised that in the production of future smartphones, it will pay special attention to the unique design and tactile sensations.

The first smartphone to reflect the company's new policy will be LG VELVET. Today, LG released a 15-second video, confirming that the official presentation of the smartphone will be held on May 7.
The new smartphone will ship in red, green, black and white. The company also announced that the heart of the LG Velvet will be the Snapdragon 765G. Therefore, it will be a 5G smartphone.

According to rumors, LG Velvet will receive a 6.7- or 6.9-inch OLED screen, a 4000 mAh battery, and a main camera sensor of 48 megapixels. The smartphone is expected to cost about $ 650.

We do not forgive "wait"

The most powerful criminals of our time kept the whole world away. Where and why did they disappear?
نحن لا نغفر  “انتظر”
Anonymous hackers have kept the world on hold for more than a decade. The authorities were afraid of them, and truth-seekers and the oppressed had hoped that Robins Hood would punish the guilty with skill. All strong crimes are attributed to a powerful group spread (in fact, to a large number of enthusiasts throughout the planet). Unidentified pirates and amateur crackers have been attributed to their "legions." Cyber ​​terrorists and freedom fighters, hiding on the other side of the screen, and Guy Fawkes masks, have been considered an inevitable terrible force that will always be on standby and will not spare anyone in its path. However, in recent years, little is known about cunning intruders, and the familiar masks have turned into a brand and only appear on shirts. What happened to the largest anarchist pirate association in history.


Glorious way

Over the years, small and sporadic groups of hackers, united under an unknown name, have launched loud attacks and penetration one after another. Their victims include governments and large corporations, pages of religious groups, large corporate systems and banks. Organized on 4chan trolls and prankers in 2003, anonymous activists (or rather, intruders) caught everyone's attention after five years when they launched a massive campaign from DDoS attacks on the site to real protests. Then the anonymous pirates showed unbelievable cohesion, and were able to clearly proclaim themselves as a large and powerful subculture.

They managed to reveal their full potential to the world two years later: in 2010, HBGary CEO Aaron Barr recklessly announced that he was ready to assign anonymous members to anyone who paid for this information and would be happy to cooperate with the FBI. According to him, all data on intruders was found in social networks. Soon the company's website fell into the hands of biscuits: Not only did he access and send correspondence to the network, but he also broke into Barr's profiles on social platforms. It was reported that they also deleted the entire contents of the tablet, but this data remains unconfirmed. It shook a terrifying slogan around the world: “We are unknown. We are a corps. We do not forgive. Do not forget. wait ". Researcher Barmy Olson suggested that the slogan "We are a legion" was chosen as particularly evil and alluded to the written statement of evil power - "My name is Legion."

In the next few years, Anonymous strengthened his position: unknown hackers spread around the world attacked censorship, and supported the pirate movement and revolutions. Fame quickly came: in 2012, Time magazine reported that it is among the most powerful people in the world. For several years, activists did not leave the newspaper strips, shocked by the new tricks: they collected data on famous personalities, declassified them from important documents and waged war on the "Islamic State" (IG, organization banned in Russia). For example, they collected an alleged full file on Donald Trump (including personal mobile phone number and social security data), justifying their nickname “WikiLeaks Successors”. The fight against jihad was carried out with the help of intrusions, site casualties and accounts belonging to the Islamic State. Provocative content is often posted on captured profiles on social networks. Hackers particularly like to color pages with rainbow flags and fill them with gay porn.


Sheer disappointment

The researchers are certain: Anonymous has become so powerful and famous that the group's name has become synonymous with an unknown anarchist on the network. This was a picture that the screenwriter later took advantage of - for example, the dangerous hackers from the “Mr.” series were removed. Robot ”is completely from“ Anonymous. ” But if it was only half a year in 2012, the group succeeded in conducting 8 online operations (including against the FBI, INTERPOL and other large organizations), in recent years little would be known about the exploits of the intruders.

According to the anonymous sayings and federations of former members Greg Housha, the group was not structured and organized: it could become part of every person wishing to display their business under the unknown "brand". If a pirate calls himself an actor, he automatically becomes a member of the movement. Among the participants were people of all ages, who expressed completely different political opinions. Nationality, wealth and sex - According to Hosh, the group does not care who you are in real life. This led to some inconvenience - this fragmentation led to a general split - small groups of activists could communicate with each other, but there was no talk of widespread connections.


The movement also had no specific goal: the members of the group recognized the general principle of "anti-repression", and the ideology of each of them was realized and embodied in its own way. Most of them defended the fight against censorship and state control over the network in order to spread freedom on the Internet. Such a situation allowed the association to develop a virtual democracy: if a number of activists share a specific idea or plan, there is an opportunity to engage with helpers and achieve the plan. However, this freedom has turned into a problem: previous participants claim that it is impossible to find an "unidentified" person who will not be annoyed or frustrated by at least one of the network's strange "colleagues" behavior. However, contacting the group forces them to accept everything the other members have done under anonymous sponsorship. In the end, I played a cruel joke with the participants.

Step into the abyss
Anonymous's first concrete problems started at its height: the federal authorities of a number of countries were unwilling to tolerate the unknown on their hypothetical scams. Many hackers associated with the group were arrested in early 2010. This did not frighten society as a whole: researchers say that joy and support prevailed in hacking chats. They were sure they had a great time with like-minded people.
جيريمي هاموند
Jeremy Hammond

A number of anonymous members soon teamed with another group called LulzSec (also known as Lulz Boat), famous for hacking websites in the US Senate, the CIA, and safer companies. In 2012, a number of members of both groups were arrested - they were reported to have been extradited by a FBI enlistment fellow, Hector Muncigor, known as Sabo. Because of him, he fell into the hands of the authorities an unknown hacker and activist Jeremy Hammond, nicknamed Anarchaos. By this time, he had already spent two years behind hacking into political firm Protest Warrior, then stole the data of five thousand payment cards, without spending a single cent of this principle. A few years ago, as a teenager, he founded the legendary portal HackThisSite, which allowed those who wanted to "culturally" train in penetration. In 2012 Hammond was sentenced to ten years in prison for attacking government systems and government companies, including the private intelligence company Stratfor. Pirates can only request conditional release in 2021.

Soon, according to the researchers, for several years, law enforcement officers from different countries were able to find more than a hundred infiltrators. The US authorities made it clear: For them, pirates have turned from margin into a serious threat, and are always ready to remind them that they are capable of violence. In 2015, anonymous journalist and keynote speaker Barrett Brown was sentenced to five years in prison and a fine of $ 890,000. Then the association's five-year term was considered a miracle: during the previous 2.5 years behind bars he tried to persuade the investigation of his innocence, because he had in general faced more than a hundred years in prison. As a result, given his time, he had to spend another 63 months behind bars.

Brown was involved in supporting the anonymous information: many hackers did not like him because of Abhi's statements on behalf of the association, but they realized that he was really sick of their common cause. Researcher Bella Coleman even baptized Brown, the "anonymous propaganda minister." Brown distributed to his portal the PM project, documents stolen by hackers. Stratfor's hack incident was fatal for him, as was Hammond's: Nevertheless, Brown was never a hacker, in fact, he just copied a link to a database containing stolen information. The suit arose out of the threats to the FBI agent in a video chat. A series of arrests of famous and unknown members, along with the most recent prominent case, dealt a heavy blow to the intruders.

last hit
However, the President of the United States, Donald Trump, hit the intruders, who apparently did not suspect that he would become a controversial figure for activists. They said it was reported that many "anonymous" Americans dreamed of gathering with colleagues from all over the world to destroy Trump - to "fix" what America could bring upon itself. These opinions were exchanged by the oldest activists.


But not everyone agreed with them: many anarchists on the Internet loved the mess the new president brought to the fossilized political life of the United States. They were happy that Trump was arrogant, not affiliated with the political elite, and who tapped the nose of politicians sitting in glorious offices. It doesn't matter if he's a bad person - hackers hailed the fact that he exploded like a natural disaster, and confused a long-established process. Such a person is completely satisfied with the ideals of free-thinking cyber fighters. The collective mind divided into unknown, most groups were unable to reach consensus. Democratic disputes in chat rooms have caused many to separate from the group.

After the presidential elections in the United States, he barely heard anonymously: their rare attacks were most likely the work of beginners or unknown amateurs. Cyber ​​technology researcher Jason Walter said the disappearance of large pirate groups has upset the balance in a world where large corporations and government authorities control everything. No one else can capture the dark secrets of the government or companies widely. He concluded that there is no longer a neutral group and is working to use corruption and the secrets of those who control the situation. According to him, in the West, hackers have done something that the media does not want or cannot do.

We will continue to fight
However, former activists have identified: the cause of the group's collapse was not only conflicts, but also a general misunderstanding of the goals. According to Michael Holland's note, which, in his own words, has been loyal to Anonymous for many years, the group has gone through many stages of development - from a company of nerds and trolls who play jokes with each other and activate "for the sake of lulz", to an international association with great ideological motives. Sure enough, Hacks was only a fraction of a percentage of all “anonymous” activity - but it's most interesting though. Previous “advertisements” that participated in cyber attacks moved to the legal sector: for example, many of them were professionally involved in information security, counseling and speaking at conferences. They lead a normal life and even have families. However, according to According to the Netherlands, most hope that he will still be able to ever make war.
According to Coleman, who wrote a book on the history of intruders, photoboards played an important role in getting rid of enthusiasm: If previously active users gathered on these sites for a purpose (and this is how the first anonymous groups were organized), users now discuss policy on The internet is platforms, I swear, and basically you don't want to do anything. When asked if Anonymous is real now, she responds negatively, describing the "effects" of her current presence on network ghosts. Indeed, security researchers are recording a decrease in piracy - since 2015, the number of attacks has decreased by 95 percent. This period coincides completely with the extinction of unknown activity. The future of this type of activity in its previous form also appears mysterious to them. "This question remains open," said Coleman.

Foreign bloggers, who inherit intruders, are worried: the world, according to them, needs tech-savvy "heroes" who can save the world from lies and injustice. “To do all this, you need a special person. Valter concluded: "They should not notice heroes without feeling gloat," and he was confident that in the modern world no one would open people's eyes to the truth until unknown infiltrators did so.

Anonymous legacy can be seen everywhere, not just online. Hagopian has become a dynamic and brutal global epidemic, and the unknown qualities and phrases of anonymous people have permeated everywhere and become part of the global culture. Experts in cybersecurity are sure: it is too early to talk about the death of this phenomenon, instead the anonymous members of the societies took a short break. Will we hear anything else about Anonymous?

Hidden threat

Because of the coronavirus, hackers have become even more dangerous and are attacking people around the world. How to protect yourself from them?


The global pandemic locked people at home: most companies transferred employees to remote work, and students and schoolchildren went to distance learning. The load on the global network has increased significantly - popular platforms are forced to deal with an influx of visitors (for example, YouTube has reduced the quality of video), and small and almost forgotten virtual services have returned to the market. However, not only IT companies are happy with the situation: the data of millions of people who came to the Internet attracted scammers and hackers. How cybercriminals use a global catastrophe for their own enrichment and whether there are ways not to fall for their tricks, Lenta.ru understood .



Exposure to fear
Fraudsters adapt to modern realities much faster than most Russians: taking advantage of the circumstances, they began to massively send out fake fines on behalf of the Ministry of Internal Affairs . Group-IB experts said that on April 10, attackers distributed fines via SMS and instant messengers. In the message, the addressees were addressed personally, indicating the name, surname and patronymic, and further clarified that the recipient is obliged to pay a penalty for violation of the self-isolation regime. Otherwise, the authors of the communication threatened to institute criminal proceedings. If the victim called back at the indicated number, the call was for

warded to the inquiry service of the Ministry of the Interior.
There were strange inconsistencies in the frightening message: the victim was given only a day to pay the fine, and the funds were offered to be transferred to the phone number registered in the Krasnodar Territory. In addition, the attackers referred to a certain non-existent FSIN resolution number 168-322: earlier it was also mentioned in numerous fraudulent letters with “fines” for visiting pornographic sites.

The Ministry of Internal Affairs also recorded an increase in theft of money from the accounts of Russians with the help of malware - in the tops of the most active dangerous programs on the whole planet banking Trojans Dridex and Trickbot were again noticed. Using spam mailings and phishing, criminals convince the victim to install a Trojan on his phone or computer, which collects payment information and withdraws funds from accounts. According to law enforcement agencies, fraudsters often also use "mirrors" of banking sites to steal funds: a phishing page is quite difficult to distinguish from a real one - the user should be warned by the lack of notifications about entering your personal account and the portal's denial of customer service. In such cases, the Ministry of Internal Affairs recommended blocking the bank account as soon as possible. According to statistics,In addition, the network records the growth of phishing pages and fake newsletters: introducing themselves as employees of banks and government agencies, criminals offer potential victims compensation for “losses”, credit vacations or assistance in obtaining loans, assistance in repaying funds for airline tickets and many other services, up to fake certificates of a coronavirus infection. Another common trick is a job offer on favorable terms. In fact, all of them are aimed only at deceiving payment details and personal data - in recent years, fraudsters have well mastered the methods of social engineering and do not miss the opportunity to apply them.

The head of the Positive Technologies analytics department, Evgeny Gnedin, in an interview with Lenta.ru explained that the user himself is powerless to make the Internet resource safe, where, for example, he pays for the purchase, the responsibility for opposing the attacks lies with the site owners. However, everyone should be careful about those sites that require bank card information and personal information, scans of personal documents, and more. You should always remember that any information that users enter on the pages of sites will remain on the Internet, which means that it can be stolen and used by attackers sooner or later. And of course, you need to set strong unique passwords for all services, and also, if possible, additionally enable two-factor authentication.

Mastering cybercriminals and new types of attacks. At the end of March, it became known about hackers who, having selected a password for the router, change the DNS settings. An unsuspecting user, entering the network, automatically gets to the page of the fake informational application about COVID-19, supposedly developed by the World Health Organization . A fake WHO insists that the user needs a program called COVID-19 Inform App, but instead he downloads the malicious Oski Trojan, which will capture all bank card information, passwords and cookies. Later, the information obtained will be used by criminals to steal funds, seize pages and phishing.

While fraudsters communicate with victims directly, many hackers went to war on Internet platforms that store huge amounts of various data on hundreds of millions of people, from card details to passport data and home addresses. The current realities place great responsibility on the services themselves: when almost the whole world has moved to the network, they cannot deceive the trust of users who have come to them. The sharp increase in user activity has become for them not only an occasion for further development, but also a powerful test for modernity and security. Unfortunately, not everyone managed.




Old enemy

In the spring of 2020, the most popular segment was the video communications segment, and especially the products that made it possible to organize conferences. So, for example, the volume of video calls made in Microsoft Teams only in March increased by 1000 percent compared to the previous monthly figures. Multiple growth can also boast Skype and Zoom. With such an influx of users, many criminals remembered the good old weapons that did not have time to show themselves in former times.


In March, the top ten most active malicious software in Russia turned out to be a virus Pykspa, which spreads via messages in to Skype. The worm can receive personal information of users and information about their contacts. According to experts from Check Point Software Technologies, it forces the application to send a phishing message with a link to all recipients, clicking on which new victims will download Pykspa to their personal devices. Millions of Skype users were at risk: at the end of 2019, the messenger was in the top of the most popular services among Russians, second only to WhatsApp, Telegram and Viber.



The last time a wide hacker campaign using this worm occurred five years ago - in 2015. The current activity of the virus can be explained only by a new round of popularity of programs for conferences and video calls. Now these massive attacks are more likely to target home users, not corporate users, but things can change at any time. Moreover, the number of Russians switching to a remote place is constantly growing - in just a few weeks of recommended self-isolation, the number of Russians working remotely increased by 14 percent.


Large services often become targets of attacks. However, there are those who turned out to be unsafe and without the participation of criminals: they were not ready for the huge flow of new users and did not have time to respond in time. Hackers can only exploit existing vulnerabilities.


Across the screen

The greatest interest of users around the world now is the Zoom service. His breakthrough in the market this spring seems almost fantastic: according to the report of the international consulting company IDC (International Data Corporation), the number of new users using the application worldwide in March 2020 exceeded the annual growth of users in 2019. If in December the daily audience of the program barely crossed the threshold of 10 million users, now this figure has increased by 20 times. In March, the capitalization of Zoom Video Communications grew by almost half during the week: then the whole world, having left offices, began to conduct meetings remotely.


A comic story is connected with this : during this period, investors accidentally several times raised the share price of the little-known Chinese equipment manufacturer Zoom Technologies - by more than 500 percent. This happened because during the exchange trading they mixed up the short exchange designations of the two companies (Zoom has a ZM ticker for video conferencing, and the Chinese company with only 10 employees has Zoom) and bought the wrong stock. A year ago, the same thing happened: when Zoom Video Communications went public, investors bought Zoom Technologies shares, raising them by 47 thousand percent.

In late March and early April, cybersecurity researchers pointed to a number of vulnerabilities that allowed cybercriminals to steal user login information, gain access to messages, and take control of cameras and microphones of interlocutors. Thousands of video call recordings were made publicly available - both corporate corporate conferences and private conversations. Journalists from The Washington Post spoke to several people whose conversations were online, and not one of them knew how this happened. It was assumed that the template names of automatically saved conversations could be manually found in the repositories. The security of current conversations turned out to be in a similar situation: earlier, Check Point employees found outthat any person could remotely connect to a random conference by selecting the number that the service assigned her. Because of this, password connections were later introduced.


Zoom CEO and founder Eric Yuan admitted that his company was not ready for a sharp increase in visitors. Leaks were due to the fact that video calls were assigned public identifiers, and the connection was not encrypted. Data encryption is one of the weaknessesservice: video calls are not protected by E2E principles (end to end, “end-to-end” encryption - in this case, only its participants can access the dialogue), which is implemented in a number of popular instant messengers or in some video communication services, for example, FaceTime. Most explain this by the features of the service. At the same time, it is indicated on the company's website that the connection in Zoom is end-to-end protected. American journalists have found that reading the employees of the service “end-to-end encryption” means protecting data transmitted between their own servers, but no one bothers to intercept the information when it is transferred from the user to the server. That is, such statements are essentially false, but attract users with loud promises. In addition, many users are confused,
200
millions
people used Zoom daily in March. Back in December, the service had only 10 million users
Until the company entered the conversation using passwords, there was a wave of zombombing around the world - zoom bombing, hooligan antics sabotaging the conversation: Internet trolls connected to other people's conversations and interfered with them - for example, they connected a demonstration of their own screen where they broadcast porn videos. There are also cases of "transfer" of records with Nazi symbols or violence. Most often, the chats of students and schoolchildren became victims of such rallies - in Saratov they recommended local schoolscompletely abandon Zoom-conferences after the incident with the broadcast of porn. Later, company employees corrected the shortcomings, and now, in order to limit interlocutors from inappropriate content, it’s enough to connect a password, allow the screen to be displayed only to the organizer of the conversation and not post links to the conference on social networks.

But this claim to the service does not end there. Experts believe that Zoom imposes its application on users, forcing them to download the program, and in the case of downloading on macOS it behaves like a dangerous program at all - it requires the user to enter a password to obtain administrator rights.

Reread, revise
In late March, British researcher Matthew Hickey said that he had found a vulnerability in the Zoom application that could easily steal Windows user data using a URL link: when a user tries to follow a link in a chat, the system gives encrypted information about him, but it’s easy to crack . The very next day, his colleague Patrick Wardle from Objective-See announced that any criminal could edit the Zoom installer for macOS in such a way that he could not only quietly record all conversations, but also get access to all information, including the camera and microphone of the device. After some time, service employees fixed these vulnerabilities.
However, later experts discovered Zoom account databases for sale on the darknet: by April 13, more than half a million login-password pairs were sold or handed out for free on hacker forums along with user personal data. Specialists from Group-IB reported that a number of accounts sold on the network belong to users with a mailing address in the domain zone ru. It is assumed that the data obtained can be used for zombombing or as a basis for new serious cybercrimes (for example, having received a login and password from Zoom, criminals can use them to gain control over accounts in other services and steal money from the victim's account). It is known that the US Senate , the Ministry of Foreign Affairs of Germany, the authorities of the state of Taiwan, as well asSpaceX Corporation refused to use Zoom, because they considered it not safe enough.




The most harmless buyer who may be interested in personal data is the companies sending out spam ads. However, it is not known exactly how hackers will want to dispose of the information received and to whom it will be more profitable for them to sell it. The work of global corporations and government agencies online can even turn into large-scale industrial espionage, huge losses and risks. Natalya Kasperskaya , president of InfoWatch Group of Companies , believes that data leaks are often used to inflict reputational damage on companies - however, it is still unclear what the users themselves should do. Potentially, the state should protect the citizens, but most Russians are unlikely to seek help if they are “offended” by a foreign IT company.

According to Positive Technologies expert Evgeny Gnedin, if a database with users' personal data has leaked, then it most likely will not be able to be returned; however, if there is a suspicion that the organization secretly discloses your personal data or simply does not protect it, then everyone has the right to contact the supervisory authorities ( Roskomnadzor ) with a request to conduct an audit. Companies storing Russian data abroad may face a fine: for example, in February of this year, fines were imposed on Twitter and Facebook by court order.in the amount of four million rubles each. The federal law on data localization came into force almost five years ago, and all companies that process personal information of Russian citizens are required to comply with it. The user himself, whose data has been compromised, can also sue. 

Customers whose data flowed into the network are recommended to be vigilant when receiving any offers by mail, phone or other means of communication. It must be understood that you are now in a zone of increased risk of attacks by fraudsters. If there were passwords among the leaked information, then you should change them and enable two-factor authentication, where possible. No need to disclose your data and payment card details, follow links to unfamiliar resources and enter information about yourself, download files from advertising mailings, click on banners

The main reasons for user data leaks are most often the abuse of authority by insider employees with access to such information and insufficiently reliable data protection - vulnerabilities or configuration errors. Leaks have become one of the key trends in the cybersecurity market in 2019, and this is also due to the approach of cybercriminals - cybercriminals began to combine the data collected over the past years into a single array for trading in the shadow market with more complete digital dossiers. There is no recipe for avoiding leaks - however, it is important to inform the company's customers about what has happened and to warn them of possible risks, to help counter fraudsters. This will not only save users, but will help maintain a reputation.



Wednesday, April 15, 2020

The FSB military unit will spend 30 million rubles on cameras


The military unit 55056 of the FSB of Russia will spend 30 million rubles on cameras. On Wednesday, April 15, reported on the website of the Government procurement.


According to the publication, all the special services will buy 447 cameras. The most expensive model in the list is the Canon EOS 5D Mark IV Body worth 282.9 thousand rubles. It is also planned to purchase 25 Canon EOS 200D cameras (or their equivalents) for 45.3 thousand rubles each, 68 pieces of Nikon COOLPIX P1000 - for 81.6 thousand rubles, two Sony α7R III Body devices - for 190.9 thousand rubles.

Cameras, the report says, are needed by the FSB to meet state needs. The initial price of the state order is 30.2 million rubles; financing is planned from the federal budget. Closed auction will be held on April 28.

On February 21, it was reported that the Russian Ministry of Defense announced a tender for the purchase of a car for 30 million rubles.
What is happening in Russia and in the world? We explain on our YouTube channel . Subscribe!