Phishing attacks are evolving to become more sophisticated, as cybercriminals invest in new methods to deceive individuals into divulging sensitive information or installing malicious software. One of the recent trends in phishing involves the utilization of QR codes, CAPTCHAs, and steganography. These techniques are employed to carry out attacks and it is important to understand...Read More
When an employee at your organization forgets their password, it typically initiates a frustrating and time-consuming process. The employee usually needs to contact the IT department and wait for a response, leading to decreased work productivity, heightened anxiety, and potential jeopardy to deadlines. However, there are better ways to handle the password reset process, such...Read More
Caring Jacket is a health monitoring jacket integrated with the proposed IoT system for monitoring COVID-19 patients. The jacket is equipped with sensors and GPS for tracking and can monitor the patient’s temperature, oxygen level, and heart rate per minute (BPM) with high accuracy. It can also remind patients to maintain social distancing protocols while...Read More
Scopus is an abstract and citation database used by researchers, academics, and institutions to track and analyze scientific literature. The database covers a wide range of disciplines, including science, technology, medicine, social sciences, and arts and humanities. Using Scopus, users can quickly assess the relevance and impact of a particular scientific article through the abstracts...Read More
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research papers as well as other intellectual outputs. This journal is aimed at promoting the dissemination of scientific knowledge and technology in the information and communication technology areas in front of an international audience of the scientific community, to encourage...Read More
As the prevalence of fake news on social media increases, the need for automatic detection of such content has become crucial. The accuracy of fake news detection is heavily dependent on the methods and classification algorithms used. A recent study proposed a context-based solution that utilizes account features and a random forest classifier to detect...Read More
IAES International Journal of Robotics and Automation (IJRA) is an academic journal focusing on the field of robotics and automation. The journal provides a platform for researchers, engineers, and experts to publish and access research articles, reviews, and technical papers related to robotics, automation, and related fields. The journal utilizes a peer review process, where...Read More
A new cybercrime operation called ‘SecuriDropper’ has emerged, which uses a method to bypass the ‘Restricted Settings’ feature in Android to install malware on devices and obtain access to Accessibility Services. Restricted Settings is a security feature introduced with Android 13 that prevents side-loaded applications (APK files) installed from outside Google Play to access powerful...Read More
Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and Science. Today we will share some news about microstrip patch antenna. A microstrip patch antenna is a flat planar antenna used for wireless communication. They are compact, unobtrusive, and suitable for applications such...Read More
Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such as the Americas, Europe, Africa, and the Asia-Pacific area. According to findings from Mandiant researchers, there are four continuous campaigns aimed at susceptible Citrix NetScaler ADC and Gateway devices, with these attacks having...Read More