Phishing in Web 3.0 | Author : Mohamed Elatoubi | Abstract | Full Text | Abstract :The emergence of Web 3.0 technologies is undoubtedly shifting the phishing threat landscape by empowering traditional attack vectors and forcing attackers to adapt and leverage new techniques. Offering new opportunities for the attackers to exploit and adding new challenges for cybersecurity professionals. This paper aims to exhibit the evolution of phishing attacks in Web 3.0, the different techniques and novel technologies cybercriminals leverage for scaling phishing campaigns, and explores the challenges and promising solutions defenders can adopt to narrow the strategic gap in this emerging component of the attack vector. |
| Enterprise Transformation Projects | Author : Antoine Trad | Abstract | Full Text | Abstract :This article illustrates the role and how to design and implement an Enterprise Transformation Project (ETP) in-house Polymathic Security Learn Process (Concept) that can use the previous ETP’s Holistic Security Concept (ETP-HSC) [1] with a major change, that includes a generic and holistic transcendent Artificial Intelligence (AI) based ETP-PSLP Concept (simply the Concept). The Concept includes interfaces to practically all AI and related technology domains, like the Author’s AI modules, Machine Learning (ML), Deep Learning (DL), Big Data (BD), Data Sciences (DS), and others (simply Intelligence). The Concept uses the author’s Polymathic transformation framework and methodology that in this article focuses on ETP’s security by using Polymathic Learning Processes (PLP) [2]. ETPs are complex and have a very high level of failure rates (at about 95 percent), and due to this fact, adding difficulties that are related to Security frameworks, Interfaceable AI products, and inexistent PLP approaches, can result in a siloed and unmaintainable ETP’s integration |
| Social Engineering as a Tool for Warfare | Author : Dauda Sule | Abstract | Full Text | Abstract :In November, 2022, a blog went viral in Nigeria which claimed the United States of America was going to reject Dollar bills printed before the year 2021 as a means of curbing corruption in African countries where criminals and corrupt politician hoard the currency. It turned out to be a false tale, but had resulted in a brief reduction in the exchange rate of the United States Dollar to the Nigerian Naira. This illustrated how fake news could influence events and attitudes in a country, in this case, there was an economic impact (positive for the country); however, other social engineering techniques have been used to manipulate citizenry of countries in recent times, like suspected Russian interference in the United States Presidential elections in 2016 which swayed public opinion in favor Donald Trump and his emergence as president |
| Cybersecurity Approach in Internet of Healthcare Things | Author : Mohammad Furqan Ali | Abstract | Full Text | Abstract :A huge demand for internet-connecting devices in the medical field is crucial for patient assistance. The current trends in healthcare industries, the Internet of Things (IoTs) play an ample role in node connectivity in the wireless domain. The main purpose of the integrated Internet of Healthcare Things (IoHTs) as well as the Internet of Medical Things (IoMTs) is the real-time observation of patients and provide a healthcare comfort zone for individuals. The emergence of novel treatment methodologies and medical tools encourages delivering services for the IoHT domain. Due to the lack of a publically useful database, that reflects cyberattacks on IoHT, extendibility privacy concern. Therefore, this study highlights the security services to the current challenges and overviews the solution of secured services targeting IoHT attacks. |
|
|