NEXT-GENERATION TOWARDS CONSTRUCTION OF CYBER-PHYSICAL SYSTEMS AND DIGITAL TWINS

By Tarun Vats, Sudhakar Kumar Cyber-Physical System Cyber-physical systems (CPSs) or intelligent systems are computer systems…

Recent Survey on Cross Site Scripting (XSS) Attacks

Cross-site scripting is a type of attack that occurs when one website is exploited to deliver…

Recent Survey on Distributed Denial of Service (DDoS) Attack

A distributed denial of service attack is an attempt to make a device or network resource…

A closer look into the technicalities of a DDoS attack

Everyone has heard about DDoS attacks [1-4] and how they can be disruptive to service and…

Log4Shell Vulnerability

By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…

Developing Cyber Attacks with Machine Learning

By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…

Fingerprint Biometrics: Popular Databases for Research

By: Vivek Singh Baghel and Surya Prakash Fingerprint biometrics is one of the extensively used biometric…

How IoT is Making DDoS Attacks More Dangerous?

By: A. Dahiya, B. B. Gupta IoT is all about connecting smart devices to the Internet…

Bitcoins may be regulated or banned by the Indian Government. Why?

By: A. Mishra The Indian government is taking the first step towards regulating the cryptocurrency Bitcoin.…

Cryptocurrency and the Evolution towards Metaverses

By: K. T.Chui, S. K. Singh Cryptocurrency has become a popular topic in recent years, with Bitcoin…

Online Social Media Threats and Its Solutions

By: Khushboo Kumari Social media threat is an important topic to talk about. As social media…

1.2 Million Accounts of GoDaddy got Hacked

According to the company, on September 6th, an unnamed hacker gained access to the accounts of…

Operating System Security and Significance of Logging

By: Nawal Kishor Introduction Computers play major role in almost every field of our life. The…

Captcha Improvement: Security from DDoS Attack

BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…

Phishing Attack in Modern World

By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…

Top 50 Cyber Security Tools for IT and Business Professionals in 2022

By: A. Khan, D. Peraković In this technological era, cyber security tools and technologies play a…

Biometric Fingerprint Authentication: Challenges and Future Research Directions

fingerprint authentication

Biometric Spoof Detection

BY: Rishika Yatishwar Gaur Things are evolving fastly towards a password-free world. This leads to excessively…

What is Mobile Phishing and How to Detect it?

By: A. Khan, K. T. Chui Smart phones play a significant role in our lives, because…

Intelligent Advancement Technology in Cyber Security

By: U. Yadav Technological advances endanger cybersecurity. Indeed, the latest developments in defense practitioners’ defensive techniques…