The Importance of Cyber Hygiene: Best Practices for Keeping Your Data Safe

As more and more of our lives move online, it’s become increasingly important to practice good…

Why Post-Quantum Cryptography is Essential for Data Protection

By: Anupama Mishra, Swami Rama Himalayan University, Dehradun, India. Eemail : anupama.mishra@ieee.org As computing power continues…

Data Poisoning Attack: Understanding the Threat and Defending Against It

By: Anupama Mishra,Swami Rama Himalayan University, Dehradun, India. Email: anupama.mishra@ieee.org As more and more organizations rely…

Building Cyber-Resilient Communication Technologies: Strategies for Enhanced Security

By: Varsha Arya, Asia University, Taiwan. Email: varshaarya21@gmail.com In today’s interconnected world, communication technologies have become…

Securing Satellite Systems: Best Practices for Designing a Secure Satellite System

By: Avadhesh Kumar Gupta, Unitedworld School of Computational Intelligence , Karnavati University, India Email: dr.avadheshgupta@gmail.com Satellite…

10 Best Practices for Cybersecurity in the Workplace in 2023

By: Arti Sachin, Insights2Techinfo, India Email: arti.sachin@insights2techinfo.com Cybersecurity is a critical concern for businesses of all…

NEXT-GENERATION TOWARDS CONSTRUCTION OF CYBER-PHYSICAL SYSTEMS AND DIGITAL TWINS

By Tarun Vats, Sudhakar Kumar Cyber-Physical System Cyber-physical systems (CPSs) or intelligent systems are computer systems…

Recent Survey on Cross Site Scripting (XSS) Attacks

Cross-site scripting is a type of attack that occurs when one website is exploited to deliver…

Recent Survey on Distributed Denial of Service (DDoS) Attack

A distributed denial of service attack is an attempt to make a device or network resource…

A closer look into the technicalities of a DDoS attack

Everyone has heard about DDoS attacks [1-4] and how they can be disruptive to service and…

Log4Shell Vulnerability

By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…

Developing Cyber Attacks with Machine Learning

By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…

Fingerprint Biometrics: Popular Databases for Research

By: Vivek Singh Baghel and Surya Prakash Fingerprint biometrics is one of the extensively used biometric…

How IoT is Making DDoS Attacks More Dangerous?

By: A. Dahiya, B. B. Gupta IoT is all about connecting smart devices to the Internet…

Bitcoins may be regulated or banned by the Indian Government. Why?

By: A. Mishra The Indian government is taking the first step towards regulating the cryptocurrency Bitcoin.…

Cryptocurrency and the Evolution towards Metaverses

By: K. T.Chui, S. K. Singh Cryptocurrency has become a popular topic in recent years, with Bitcoin…

Online Social Media Threats and Its Solutions

By: Khushboo Kumari Social media threat is an important topic to talk about. As social media…

1.2 Million Accounts of GoDaddy got Hacked

According to the company, on September 6th, an unnamed hacker gained access to the accounts of…

Operating System Security and Significance of Logging

By: Nawal Kishor Introduction Computers play major role in almost every field of our life. The…

Captcha Improvement: Security from DDoS Attack

BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…