Recently, a backdoor built into Zyxel device models was discovered and is being exploited by hackers. These device models are used by multitudes of people as VPNs, firewalls and wireless access points. According to a researcher from a Netherlands-based security…
Category: Security
US Agencies Hacked in Cyberespionage Campaign
The networks of the Treasury and Commerce departments were hacked as part of a monthlong global cyberespionage campaign that. This was revealed on Sunday just days after FireEye— a popular cybersecurity firm— reported that it had been breached in an…
Police Drones are Starting to Have a Mind of Their Own
In a city in Southern California, drones using artificial intelligence are assisting investigations, while presenting a somewhat controversial question on civil rights. In Chula Vista, California, when the police receive a 911 distress call, with just the press of a…
Biosecurity Hazard as Scientists’ Computer Can Now Be Infected With Malware to Create Deadly Viruses or Toxins
Researchers of cybersecurity have discovered a novel kind of attack which deceives scientists into the creation of harmful chemicals or deadly viruses in their own lab. A research team from Ben-Gurion University of the Negev can infect the computer of…
MIT Researchers: Voting Risks Associated with Blockchain
Proving that the losing party did, in fact, lose in an election is an important part, one that is very difficult to solve electronically. Researchers from the Massachusetts Institute of Technology (MIT) have said that claims that “voting on the…
Exploring Opportunities in Covid-19: Artificial Intelligence & Security
IEEE Sweden board member and SMIEEE, Dr Celestine Iwendi was put on SPOTLIGHT by the students and Faculties of ILMA University, Pakistan on the 30th of June 2020. The Talk is below. Happy reading. in Pdf
What Is a CVV Shop?
Deep in the recesses of the Internet lies the Dark web. While there’s plenty of good that modern technology has provided, some parts can harm us and are best to avoid. We hear about data breaches and multimillion-dollar corporations getting…
ACO Based KMT Mechanism for WSN Security and Data Collection
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/02/cele.pdf”]
ICIT 2018: WIRELESS SENSOR NETWORKS: HARDWARE/SOFTWARE DESIGN ASPECTS FOR INDUSTRY
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2017/08/SS_4_ICIT2018_WSN_web_version.pdf”]
MIT’s Solve 2017 Problem Solving Global challenges
Solve has launched its new challenges for 2017, which is a good base for wireless sensor network practitioners, researchers and IoT experts to showcase why the future belongs to us. According to MIT President Rafael Reif at Solve at MIT…