News & Updates

News & Insight

Blogs

IJ-ICT Scopus-quality journal

International Journal of Informatics and Communication Technology (IJ-ICT) is an academic journal focusing on research and development in informatics and communication technology....

IAES Nawala: Face recognition

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala from the Institute of Advanced Engineering and...

Teaching English as Second Language: challenge and expectation for the teacher

Becoming a teacher is a choice and a big risk. Consider the duties and obligations that teachers carry out in their profession....

IAES Nawala: Embedded system

Greetings, fellow Nawala! May you always be in good health. This is the Nawala IAES of the Institute of Advanced Engineering and...
1 10 11 12 13 14 21

Announcements

POSTECH Scholarship Graduate Admissions

Pohang University of Science and Technology (POSTECH) is one of the Top 3 science and technology universities in South Korea. POSTECH is...

A new issue has been published!! TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 21, No 4: August 2023

TELKOMNIKA (Telecommunication Computing Electronics and Control) is an international journal that focuses on the fields of telecommunications, computing, electronics, and control systems....

McCall MacBain Scholarships for Fully Funded Masters/NONDEGREE in Canada

DEADLINE 24 Agt 2023 MAJORS Natural Science Actuarial Science Health and Medical Sciences Dentistry Medical Physics Engineering Electrical Engineering Mechanical Computer Engineering...

Fully Funded Scholarships in Saudi Arabia at King Abdulaziz University

Start your study adventure in Saudia Arabia. Good news! King Abdulaziz University Scholarships are currently open. In this article we will explain in...
1 10 11 12 13 14 17

News

The MavenGate attack could let hackers to take control of Java and Android systems by exploiting abandoned libraries

attack is a supply chain attack method that allows hackers to hijack popular abandoned libraries in Java and Android applications, potentially injecting...

Enhance the Security of Your Software Supply Chain with These Strategies

Software Supply Chain Security (SSCS) is the practice of implementing security measures and best practices throughout the entire software development and distribution...

GitHub warns users to enable 2FA before upcoming deadline

Two-factor authentication (2FA) is an extra layer of security used when logging into websites or apps. With 2FA, users have to log...

Fraudulent VPN Chrome extensions have been automatically installed over 1.5 million times

Three malicious Chrome extensions, posing as VPNs, were force-installed 1.5 million times, causing significant concern for users’ security. These extensions, netPlus (1...
1 10 11 12 13 14 32