Lithuania and Poland
Cyber security

Searching for things in common between Lithuanians and Poles may be the best response to the efforts to divide them

States antagonistic to Lithuania often employ the strategy of “divide and conquer” to foment division within the country and between it and its allies. Below, Dr. Viktor Denisenko, Assistant at the Political Communications Department at the Vilnius University Communications School sheds light on what the tools are used to exert informational pressure and to divide Lithuanian and Polish societies, as well as on how to best search for common ground between the two nations. […]

French troops in Mali
Defence

Lithuanian troops to be decorated after Mali deployment

Lithuanian soldiers of the 1st Territorial Unit, Dainava Military District, National Defense Volunteer Force will be decorated in the southern city of Alytus on Wednesday for their participation in the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA). […]

No Picture
CORPORATE

Attacks happened before as well: times when the LRT was headed by two directors and the budget was drastically cut

The ruling Farmer Greens, who are aiming to change the LRT’s management and council member appointment procedures, are by far not the first to have taken aim at controlling the national broadcaster. Analogous initiatives arose […]

Lithuanian passport
Politics

Seimas to turn to Constitutional Court over lower referendum threshold, PM says

If the Seimas decides to lower the referendum threshold for two chapters of the Constitution that now have a higher level of protection, the Constitutional Court will be asked to give its opinion on the amendment, Prime Minister Saulius Skvernelis said on Tuesday. […]

No Picture
Cyber security

How to check that cybercriminals don’t hide behind incoming requests for help

Many have seen heart-wrenching stories about people struggling with serious disease or experiencing difficulties after unexpected misfortune such as a natural disaster circulate online. Unfortunately, such stories – and the requests to donate money or otherwise help these people – may simply be a cynical scheme to extract money from unsuspecting people. Experts list 5 recommendations on how to best recognize if cybercriminals hide behind a request for help. […]