As more and more of our lives move online, it’s become increasingly important to practice good…
Category: Cyber Security & Network Forensics
Why Post-Quantum Cryptography is Essential for Data Protection
By: Anupama Mishra, Swami Rama Himalayan University, Dehradun, India. Eemail : anupama.mishra@ieee.org As computing power continues…
Data Poisoning Attack: Understanding the Threat and Defending Against It
By: Anupama Mishra,Swami Rama Himalayan University, Dehradun, India. Email: anupama.mishra@ieee.org As more and more organizations rely…
Building Cyber-Resilient Communication Technologies: Strategies for Enhanced Security
By: Varsha Arya, Asia University, Taiwan. Email: varshaarya21@gmail.com In today’s interconnected world, communication technologies have become…
Securing Satellite Systems: Best Practices for Designing a Secure Satellite System
By: Avadhesh Kumar Gupta, Unitedworld School of Computational Intelligence , Karnavati University, India Email: dr.avadheshgupta@gmail.com Satellite…
10 Best Practices for Cybersecurity in the Workplace in 2023
By: Arti Sachin, Insights2Techinfo, India Email: arti.sachin@insights2techinfo.com Cybersecurity is a critical concern for businesses of all…
NEXT-GENERATION TOWARDS CONSTRUCTION OF CYBER-PHYSICAL SYSTEMS AND DIGITAL TWINS
By Tarun Vats, Sudhakar Kumar Cyber-Physical System Cyber-physical systems (CPSs) or intelligent systems are computer systems…
Recent Survey on Cross Site Scripting (XSS) Attacks
Cross-site scripting is a type of attack that occurs when one website is exploited to deliver…
Recent Survey on Distributed Denial of Service (DDoS) Attack
A distributed denial of service attack is an attempt to make a device or network resource…
A closer look into the technicalities of a DDoS attack
Everyone has heard about DDoS attacks [1-4] and how they can be disruptive to service and…
Log4Shell Vulnerability
By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…
Developing Cyber Attacks with Machine Learning
By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…
Fingerprint Biometrics: Popular Databases for Research
By: Vivek Singh Baghel and Surya Prakash Fingerprint biometrics is one of the extensively used biometric…
How IoT is Making DDoS Attacks More Dangerous?
By: A. Dahiya, B. B. Gupta IoT is all about connecting smart devices to the Internet…
Bitcoins may be regulated or banned by the Indian Government. Why?
By: A. Mishra The Indian government is taking the first step towards regulating the cryptocurrency Bitcoin.…
Online Social Media Threats and Its Solutions
By: Khushboo Kumari Social media threat is an important topic to talk about. As social media…
1.2 Million Accounts of GoDaddy got Hacked
According to the company, on September 6th, an unnamed hacker gained access to the accounts of…
Captcha Improvement: Security from DDoS Attack
BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…