cybersecurity Tag

The general idea which dawns upon us when we hear about cyber threats is software vulnerabilities, malware attacks, data damage, unauthorised access to sensitive data, wiper attacks, and data manipulation. Adding on to this list, a new threat of hardware sabotage has emerged which is even harder to detect and poses a great security threat often causing deterioration of the whole system.   Hardware sabotage involves deliberate...

Read More
granite

Christopher Chapin, a Northeastern University graduate, while referring to a commitment from the General Services Administration to invest $50 billion in federal telecom contracts over the next 15 years with 10 American companies was a moment of gasp in the room. Chapin, senior vice president and chief information officer at Granite Telecommunications explained, “We are growing rapidly, by about $150 million a year. And with...

Read More
our

As the world becomes more connected, it also becomes more exposed to vulnerabilities. Technological and economic developments have pushed smaller and more capable devices into our work and social lives. Now, it’s common to have a laptop, a smartphone, a tablet, and any number of peripheral supporting devices. And, these devices are only going to evolve in the future, appearing in ordinary objects that we...

Read More

Remember that one time when you prank-called a friend? Hilarious, wasn’t it? As long as the facts are right one of the major crimes of 21st Century started as a prank. In 1878 a group of teenage operators decided to misdirect and disconnect calls at Bell Telephone. That was the first official recorded hacking in the history of technology. Computer hacking came somewhere in 1960s....

Read More
internet

Want to know how the weather’s like today? Or look up a long-lost friend from your childhood? The internet has made pretty much everything possible right now. But there really is more going on than what really reaches the eye.   Once on the internet, your data is not private anymore. The hackers, the unsecured networks, the fears of endless data breaches, and intrusions always come along...

Read More

In today’s scenario, internet has become a source to connect and interact with people worldwide. It has its applications in various fields of industry as well. However, getting the focus off from the brighter side for once and considering the cons of the internet, we certainly know how hacking has affected us badly. All the online transactions cannot be called secured. Therefore, to prevent the...

Read More
Cybersecurity on the internet

With every passing day, there is immense development of technology making everything easier for us. But the radical truth here is that it makes things similarly easy for the bad guys, if not more, to exploit us naïve users of the internet. Innumerable hacking organisations and cybervillans out there are spreading terror and the world needs a lot of cyber heroes to take them out.   Northeastern...

Read More
safety-and-security

A group of students from Northeastern University participated in the MITRE’s Embedded Capture the Flag competition where they were challenged to build a security system that can protect its intellectual property. The group successfully designed a prototype gaming console that stopped every attempted attack and won the competition.   The students also proved to be impressive hackers, themselves, by defeating the security measures in the systems designed...

Read More