Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Ukraine

Ukraine is a country in Eastern Europe. It is the second-largest country by area in Europe after Russia, which it borders to the east and north-east. Ukraine also shares borders with Belarus to the north; Poland, Slovakia, and Hungary to the west; Romania and Moldova to the south; and has a coastline along the Sea of Azov and the Black Sea. It spans an area of 603,628 km2 (233,062 sq mi), with a population of 43.6 million, and is the eighth-most populous country in Europe. The nation’s capital and largest city is Kyiv.

The territory of modern Ukraine has been inhabited since 32,000 BC. Following its independence, Ukraine declared itself a neutral state; it formed a limited military partnership with Russia and other CIS countries while also establishing a partnership with NATO in 1994. In 2013, after the government of President Viktor Yanukovych had decided to suspend the Ukraine–European Union Association Agreement and seek closer economic ties with Russia, a several-months-long wave of demonstrations and protests known as the Euromaidan began, which later escalated into the Revolution of Dignity that led to the overthrow of Yanukovych and the establishment of a new government. These events formed the background for the annexation of Crimea by Russia in March 2014 and the War in Donbas, a protracted conflict with Russian-backed separatists, from April 2014 until the Russian invasion in February 2022.

Ukraine is a developing country ranking 74th in the Human Development Index. It suffers from a high poverty rate as well as severe corruption. However, because of its extensive fertile farmlands, Ukraine is one of the largest grain exporters in the world. Ukraine is a unitary republic under a semi-presidential system with separation of powers into legislative, executive, and judicial branches. The country is a member of the United Nations, the Council of Europe, the OSCE, the GUAM organization, the Association Trio, and the Lublin Triangle.
—Wikipedia, “Ukraine“

a ball peeking out from the corner - Photograph: Serg Myshkovsky/Getty Images
Articles / CyberSecurity

Open Source Intelligence May Be Changing Old-School War

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

Open Source Intelligence May Be Changing Old-School War Read More
Computing & Technology / Books, Reports, Films & Images

How Bellingcat is using TikTok to investigate the war in Ukraine

The data detectives at Bellingcat showed 60 Minutes how social media is providing evidence of alleged Russian war crimes and other atrocities.

How Bellingcat is using TikTok to investigate the war in Ukraine Read More
Electrical powerlines on pylons in Ukraine - Photograph: Joseph Sywenkyj/Bloomberg/Getty Images
Articles / CyberSecurity

Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine

The attack was the first in five years to use Sandworm’s Industroyer malware, which is designed to automatically trigger power disruptions.

Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine Read More
Aerial view of civilians walking around destroyed residential neighborhood in Borodianka Ukraine - Photograph: Anastasia Vlasova/Getty Images
Computing & Technology / Articles

The Race to Archive Social Posts That May Prove Russian War Crimes

Painstaking new techniques for archiving social media posts could provide crucial evidence in future prosecutions.

The Race to Archive Social Posts That May Prove Russian War Crimes Read More
U.S. President Joe Biden delivers remarks on developments in Ukraine and Russia to reporters - Photograph: Drew Angerer/Getty Images
Articles / CyberSecurity

How Russia’s Invasion Triggered a US Crackdown on Its Hackers

The Biden White House is using “all of the levers of national power” to counter—or preempt—cyberattacks by Russia’s most dangerous hacker groups.

How Russia’s Invasion Triggered a US Crackdown on Its Hackers Read More
Russian soldiers sitting on a tank - Photograph: Sefa Karacan/Getty Images
Articles / CyberSecurity

Russia Is Leaking Data Like a Sieve

Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.

Russia Is Leaking Data Like a Sieve Read More
Rescuers carry a wounded person on the stretcher as they respond to shelling in central Kharkiv, northeastern Ukraine, on March 1, 2022. - (Photo by Vyacheslav Madiyevskyy/Ukrinform/NurPhoto)
Computing & Technology / Articles

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine

With more videos and images coming to light each day, Bellingcat and members of its Global Authentication Project have begun to log and map these incidents on an interactive TimeMap.

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine Read More
Ukrainian soldier standing on top of a seized Russian military tank in the woods - Photograph: Metin Aktas/Getty Images
Computing & Technology / Articles

As Russia Plots Its Next Move, an AI Listens to the Chatter

With vast amounts of data becoming available to intelligence analysts, new tools will help them sift and interpret it all—but they will introduce new risks, too.

As Russia Plots Its Next Move, an AI Listens to the Chatter Read More
Silhouette of a person standing in front of the Kremlin's Spasskaya tower and St Basil's cathedral at sunset in Moscow.. - Photograph: Getty Images
Computing & Technology / Articles

Russia Is Facing a Tech Worker Exodus

With founders and developers scrambling for the exit, the Russian tech scene is taking a major hit.

Russia Is Facing a Tech Worker Exodus Read More
KYIV, UKRAINE - People hold signs and chant slogans during a protest outside the Russian Embassy on February 22, 2022 in Kyiv in anticipation of an invasion from Russia. (Photo by Chris McGrath/Getty Images)
Articles / CyberSecurity

Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries

The wiper, dubbed HermeticWiper, struck a bank in Ukraine as well as machines in Latvia and Lithuania belonging to two contractors that work with the Ukrainian government.

Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries Read More
Illustration of Ukrainian flag made of code - Illustration by Nicholas Konrad / The New Yorker
Articles / CyberSecurity

The Threat of Russian Cyberattacks Looms Large

So far, the Russian invasion of Ukraine has not involved the sort of devastating cyberattacks that many anticipated. But it’s not clear why, or whether that pattern will hold.

The Threat of Russian Cyberattacks Looms Large Read More
Ukrainian troops. (Official photo by the Ministry of Defense of Ukraine)
Articles / CyberSecurity

Cyber Realism in a Time of War

“For all the talk about ‘cyber war’, today shows that when conflict escalates to this point it is secondary. If you want to take out infrastructure then missiles are more straightforward than using computer code. Cyber’s main role now is perhaps to sow confusion about events.”

Cyber Realism in a Time of War Read More
A collage with a demonstrator waving a Ukrainian flag. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine

A wave of cyberattacks meant to make a statement and particularly buoy Ukraine could have unintended consequences.

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine Read More
people watch Vladimir Putin's address - AP Photo/Denis Kaminev, File
Computing & Technology / Articles

Activists are using ads to sneak real news to Russians about Ukraine

From pop-up notifications to Facebook ads, campaigners in Ukraine and beyond are using any means necessary to beat Russia’s information firewall.

Activists are using ads to sneak real news to Russians about Ukraine Read More
Young girl seen reading news on cell phone at a bomb shelter in Kyiv Ukraine - Photograph: SOPA Images/Getty Images
Articles / CyberSecurity

When War Struck, Ukraine Turned to Telegram

As Russian troops surround Kyiv, millions of Ukrainians have relied on the messaging platform for government information.

When War Struck, Ukraine Turned to Telegram Read More
Multicolored ethernet cables tangled into a ball against a black background - Photograph: Nikuwka/Getty Images
Computing & Technology / Articles

Why ICANN Won’t Revoke Russian Internet Domains

The organization says cutting the country off would have “devastating” effects on the global internet system.

Why ICANN Won’t Revoke Russian Internet Domains Read More
Russian serviceman operating a T72B3 tank of the Russian Southern Military District's 150th Rifle Division in a snowy field - Photograph: Erik Romanenko\Getty Images
Computing & Technology / Articles

Online Sleuths Are Using Face Recognition to ID Russian Soldiers

It takes five minutes to put a name to a soldier’s face using little more than a screenshot, but there’s a catch.

Online Sleuths Are Using Face Recognition to ID Russian Soldiers Read More
Collage of images of Putin proUkraine protesters Russian soldiers and cracked computer screen - Photo-Illustration: Sam Whitney; Getty Images
Articles / CyberSecurity

The Spectacular Collapse of Putin’s Disinformation Machinery

A few critical errors have brought down Russia’s complex and objectively brilliant war of influence in the West.

The Spectacular Collapse of Putin’s Disinformation Machinery Read More
Illustration of wifi symbol made of fortified metal - Illustration: Sam Whitney; Getty Images
Articles / CyberSecurity

How Ukraine’s Internet Can Fend Off Russian Attacks

The besieged country’s complex internet infrastructure has evolved to promote resiliency.

How Ukraine’s Internet Can Fend Off Russian Attacks Read More
Aerial view of the Pripyat River on the border of Ukraine and Belarus taken by a Capella Space SAR satellite - Courtesy of Capella Space
Computing & Technology / Articles

High Above Ukraine, Satellites Get Embroiled in the War

While the Russian invasion rages on the ground, companies that operate data-collecting satellites find themselves in an awkward position.

High Above Ukraine, Satellites Get Embroiled in the War Read More

Posts navigation

1 2 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Cybersecurity as Illuminator for the Future of Computing Research
  • Two Paths for Digital Disability Law
  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action
  • The Troubling Future for Facial Recognition Software
  • Winter Storm Elliott – December, 2022
  • Technology’s Impact on Morality
  • Trust, Regulation, and Human-in-the-Loop AI: within the European region
  • How Facebook and Google fund global misinformation

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (606)
    • Climate (19)
    • Computing & Technology (301)
    • CyberSecurity (216)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (36)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (590)
    • Articles (501)
    • Books, Reports, Films & Images (62)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (28)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

January 22-28, 2023 is Data Privacy Week

Mum’s the word…

National Cybersecurity Alliance - Data Privacy Week Logo

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top