AJ SKMar 28, 20202 min readHardware Sabotage: An emerging cybersecurity threatThe general idea which dawns upon us when we hear about cyber threats is software vulnerabilities, malware attacks, data damage,...
AJ SKMar 5, 20202 min readGranite with Enterprise Infrastructure SolutionsChristopher Chapin, a Northeastern University graduate, while referring to a commitment from the General Services Administration to...
AJ SKOct 4, 20192 min readHow secure are we really with the evolving technology?As the world becomes more connected, it also becomes more exposed to vulnerabilities. Technological and economic developments have pushed...
AJ SKAug 10, 20192 min readCyber Crimes: From entertainment to punishable offenceRemember that one time when you prank-called a friend? Hilarious, wasn’t it? As long as the facts are right one of the major crimes of...
AJ SKAug 2, 20192 min readThe Internet: A web of problems?Want to know how the weather’s like today? Or look up a long-lost friend from your childhood? The internet has made pretty much...
AJ SKAug 1, 20192 min readInternational Partnership against Cybersecurity IssuesIn today’s scenario, internet has become a source to connect and interact with people worldwide. It has its applications in various...
AJ SKJul 25, 20192 min readCybersecurity: New heroes on the blockWith every passing day, there is immense development of technology making everything easier for us. But the radical truth here is that it...
AJ SKJul 19, 20192 min readHere’s how a small gap in security can be of great advantage to hackersA group of students from Northeastern University participated in the MITRE’s Embedded Capture the Flag competition where they were...