Cyber Security

BASE DOCUMENTS

DailyPost 481 BASE DOCUMENTS Documents which provide the purpose, definition, ingredients & the modalities to create, operate & facilitate achieving the results can be termed as Base Documents. Though all of us are in search of such documents to gather basic functional knowledge of the topic, project or technology, it is goes unexpressed. The creation […]

BASE DOCUMENTS Read More »

GOOGLED : VULNERABILITIES IN CHIP

DailyPost 466 GOOGLED: VULNERABILITIES IN CHIP While cyber breaches are legally mandated to intimated to the law enforcement agencies at least in all developed countries, what happens if the vulnerabilities pertain to the chip, hardware, the architecture itself? While doing specular memory research, Google discovered vulnerabilities in Intel & other chips. Chips would thus become

GOOGLED : VULNERABILITIES IN CHIP Read More »

ARTIFICIAL INTELLIGENCE TRENDS 2018

DailyPost 462 ARTIFICIAL INTELLIGENCE TRENDS 2018 2017 has been a breakthrough year with the achievements of AlphaZero, moving into a machine created Intelligence. Alexa was added to our repository of Siri, Cortana, making a beginning in AI assistants age. Huge amount of funding is going in AI research. It becomes the main narrative of future

ARTIFICIAL INTELLIGENCE TRENDS 2018 Read More »

CYBER SECURITY TRENDS 2018

DailyPost 461 CYBER SECURITY TRENDS 2018 Since 2014, Cyber Security has continually reminded the number one security threat to the world. WannaCry, Petya and backend ISIS of the Cyber World, Lazarus, hogged the international news headlines in 2017. Phishing becomes the most favoured initial access methodology and ransomware the ultimate tool. Machine Learning & Artificial

CYBER SECURITY TRENDS 2018 Read More »

COMMODITIZING RANSOMWARE – AS A SERVICE

DailyPost 457 COMMODITIZING RANSOMWARE – AS A SERVICE Modern business landscape has a paradigm shift to Subscription Economy. This model is not limited to Netflix & Spotify, Ransomware-as-a Service has gained currency. This system allows anybody with a internet connection, regardless of their technical literacy, to purchase powerful ransomware via the Dark Web & carry

COMMODITIZING RANSOMWARE – AS A SERVICE Read More »

CRITICAL INFORMATION INFRASTRUCTURE.

DailyPost 448 CRITICAL INFORMATION INFRASTRUCTURE. At the backend of every critical infrastructure is a critical information infrastructure, which keeps it moving. This is the nervous system of the critical information infrastructure as all communications & operations is nearly fully controlled by this system. From banking to power to oil, all that propels our existence is

CRITICAL INFORMATION INFRASTRUCTURE. Read More »

NSA

DailyPost 436 NSA : Do they know all?  Lead by the National Security Agency, NSA, US’s 17 intelligence agencies see the world differently. Shrouded in secrecy, with an estimated US spending of $ 72 billions on intelligence, more than rest of the world combined, is an information regime, for accessing, collecting & analysing every single

NSA Read More »

Scroll to Top