AJ SKMar 28, 20202 minHardware Sabotage: An emerging cybersecurity threatThe general idea which dawns upon us when we hear about cyber threats is software vulnerabilities, malware attacks, data damage,...
AJ SKMar 5, 20202 minGranite with Enterprise Infrastructure SolutionsChristopher Chapin, a Northeastern University graduate, while referring to a commitment from the General Services Administration to...
AJ SKOct 4, 20192 minHow secure are we really with the evolving technology?As the world becomes more connected, it also becomes more exposed to vulnerabilities. Technological and economic developments have pushed...
AJ SKAug 10, 20192 minCyber Crimes: From entertainment to punishable offenceRemember that one time when you prank-called a friend? Hilarious, wasn’t it? As long as the facts are right one of the major crimes of...
AJ SKAug 2, 20192 minThe Internet: A web of problems?Want to know how the weather’s like today? Or look up a long-lost friend from your childhood? The internet has made pretty much...
AJ SKAug 1, 20192 minInternational Partnership against Cybersecurity IssuesIn today’s scenario, internet has become a source to connect and interact with people worldwide. It has its applications in various...
AJ SKJul 25, 20192 minCybersecurity: New heroes on the blockWith every passing day, there is immense development of technology making everything easier for us. But the radical truth here is that it...
AJ SKJul 19, 20192 minHere’s how a small gap in security can be of great advantage to hackersA group of students from Northeastern University participated in the MITRE’s Embedded Capture the Flag competition where they were...