Posts

Showing posts with the label Security

Data Science: Digital Means of Unveiling Culprits and Their Deadliest Intentions

Image
In one of my unpublished research papers “The Role of Data Science in Detection of Fraud and Intrusion over a Network”, I explained in detail how fraud, intrusion and any kind of illegal communications and actions can be detected and thwarted with the use of modern technologies. The implementation of modern technologies such as machine learning and data science algorithms like logistic regression and artificial neural networks which have human-like decision-making techniques will play an enormous role in this kind of task. Today, internet fraud is increasingly becoming very common in the modern world because even in the technologically and economically developed countries like the United States, this pandemic fraud is still partaking on the virtual planet like a bushfire. According to Rossenberg (2007), in 2006, the United States recorded a loss of 198 million dollars due to internet fraud, while in the same year BBC report says the United Kingdom recorded an annual loss of 150 million...

Why You Should Not Expose Your Identity Everywhere

Image
  Advisably, you’re not meant to expose your identity everywhere. Today, social media has become a great challenge to your identity. It is a public podium in which different kinds of people appear for many purposes. To even forget the egoism of being scammed, cheated, or deceived your identity and sensitive information should always remain private. Here are the five security challenges you might have faced on social media and advises to avoid them: 1. Do not share your whereabouts It is always one of the habits of social media users sharing their whereabouts at current places. Be careful and not to share your current location wherever you are. This, of course, gives adversaries an opportunity to easily find victims and trace them. The only thing you need to do is to allow the ‘location’ feature of your phone to be turned on whenever you’re traveling. This will enable authority trackers to trace your whereabouts for security purposes. 2. Do not upload pictures where travelling Your ...

How Does Spam Attack Destroy a System?

Image
  It has been a widespread problem over a network whether a personal peer-to-peer connection, wired connection, local area network, metropolitan area network or even wide area network connection; a problem of spamming as a means of attack. Thousands of computers are hacked through this method. This  research comes up with  a ray of light on what “spam attack” means, its processes of hacking, methods of tackling and how does it affects our computers. This research is done by Muhammad Auwal Ahmad as an academic work. Introduction Spamming  is the use of messaging systems to send an unsolicited message ( spam ), especially advertising, as well as sending messages repeatedly on the same website. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads s...