Articles that are tagged
RESEARCH AND DEVELOPMENT
Hackers use rogue websites to attack organizations with lateral phishing
2 years ago
Microsoft has disclosed details of phishing campaigns used to target organizations by using stolen credentials to register on devices on the victim's network and spread spam emails to increase the infection pool. Microsoft also said that the attack occurs through the accounts that were not secured using multi-factor authentication (... Read more
Microsoft has disclosed details of phishing campaigns used to target organizations by using stolen credentials... Read more
RESEARCH AND DEVELOPMENT
India Eyeing Self Developed OS to Rival iOS and Android
2 years ago
The the Ministry of Electronics and Information Technology has announced that the Government is planning to promote the creation of an "indigenous" mobile Operating System to compete with iOS and Android. India is an increasingly important market to Apple, but it continues to face fierce competition from Android... Read more
The the Ministry of Electronics and Information Technology has announced that the Government... Read more
RESEARCH AND DEVELOPMENT
WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud
3 years ago
WhatsApp recently announced that it would be bringing end-to end encrypted chat backups to the cloud for Android and iOS users, allowing users to save information including chat messages and photographs in a cryptographically safe manner on Apple iCloud or Google Drive. This feature is expected to go live in... Read more
WhatsApp recently announced that it would be bringing end-to end encrypted chat backups to the... Read more
RESEARCH AND DEVELOPMENT
Implementation of Cobalt Strike Beacon
3 years ago
This Monday, Researchers disclosed a newly discovered Linux and Windows enactment of Cobalt Strike Beacon, which actively set its sight on government, telecommunications, IT, and financial institutions worldwide. The yet-to-be-detected version of penetration testing tool, also code-named “Vermilion Strike,” has marked one of the rare Linux Ports, i.e., a... Read more
This Monday, Researchers disclosed a newly discovered Linux and Windows enactment of Cobalt Strike Beacon,... Read more
RESEARCH AND DEVELOPMENT
US cyber security firm says it can protect phones against Pegasus
3 years ago
Zimperium, a US-based technology firm that specializes in mobile phone security, claims that it can protect organizations and individuals from zero-day attacks often used by Pegasus or similar spyware programs and has recently secured a contract with the United States Department of Defence (DOD) to deliver a Mobile Endpoint Protection... Read more
Zimperium, a US-based technology firm that specializes in mobile phone security, claims that it can... Read more
RESEARCH AND DEVELOPMENT
OPAD: A New Adversarial Attack Targeting Artificial Intelligence
3 years ago
Researchers have discovered a new adversarial attack that can fool AI technologies. This new attack—OPtical ADversarial attack (OPAD)—is based on three main objects—a camera, a low-cost projector, and a computer. OPAD is based on a low-cost projector-camera system in which researchers have projected calculated patterns to modify the appearance of... Read more
Researchers have discovered a new adversarial attack that can fool AI technologies. This new attack—OPtical... Read more
RESEARCH AND DEVELOPMENT
Elon Musk unveils an AI humanoid Robot
3 years ago
Speaking at Tesla's AI Day event, Tesla CEO Elon Musk unveiled a humanoid robot called the Tesla Bot that works on the similar AI used by Tesla's vehicle. It is designed to eliminate repetitive, dangerous, boring tasks. Tesla Bot is 173 centimeters tall, weighs 57 kilograms, and has 40 electromechanical... Read more
Speaking at Tesla's AI Day event, Tesla CEO Elon Musk unveiled a humanoid robot called... Read more
RESEARCH AND DEVELOPMENT
UK universities awarded funding for research into IoT
3 years ago
A grant has been awarded to various British colleges to explore security issues encompassing Internet of Things (IoT). Reported on July 13, the 'PrivIoT' project driven by Dr. James Nicholson, a speaker at Northumbria University's Computer and Information Sciences office, will likewise include scholastics from Royal Holloway, Manchester, and Nottingham... Read more
A grant has been awarded to various British colleges to explore security issues encompassing Internet... Read more
RESEARCH AND DEVELOPMENT
Easy Secure Photos algo to encrypt images on the cloud
3 years ago
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that encrypts photos uploaded to any cloud service like Google Photos or iCloud without making any changes to the services themselves. The encryption of photos on the cloud was a huge problem since most lcoud services... Read more
Researchers at Columbia Engineering have developed a new technique called Easy Secure Photos (ESP) that... Read more