News & Updates

News & Insight

Blogs

The IAES Nawala: Student mental health

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and...

Challenges of cloud computing and IoT devices

Cloud computing is an advancement in information technology as a method of delivering various services over the internet and remotely in the...

The IAES’s Nawala: NOMA

Greetings, fellow Newsletters! May you always be in good health. This is the IAES’s Nawala of the Institute of Advanced Engineering and...

Very large scale integration (VLSI)

Very large scale integration (VLSI) is the process of making an integrated circuit (IC) by combining thousands of transistors into one chip...
1 13 14 15 16 17 21

Announcements

Journal of Education and Learning (EduLearn) is accepted for indexation in Scopus

We are pleased to announce that EduLearn has met the requirements for its quality and has been approved for inclusion indexation in...

Darmasiswa Scholarship Programs

“DARMASISWA is a scholarship program offered to all foreign students from countries which have diplomatic relationship with Indonesia to study Bahasa, art...

Danish State Scholarship (Denmark Government Scholarships)

The Danish Government Scholarships are available to Study a Bachelor, Master, or PhD Degree Programs at Denmark Universities. The Denmark Government Scholarship is Supported by the Ministry of...

GREAT Scholarships-British Council

For the 2023-24 academic year, postgraduate scholarships are available at the following institutions. Please visit the university page below for more information...
1 13 14 15 16 17

News

A cybercriminal service circumvents Android security measures to implant malicious software

A new cybercrime operation called ‘SecuriDropper’ has emerged, which uses a method to bypass the ‘Restricted Settings’ feature in Android to install...

Cybercriminals are employing the Citrix Bleed vulnerability to target government networks on a global scale

Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such...

Prolific Puma, An Obscure Link-Shortening Service, Has Been Revealed As A Hub For Cybercriminal Activities Through An Analysis Of DNS Data

A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four...

Google Chrome automatically switches to secure connections for all its users

Google has implemented a substantial improvement in Chrome’s online security by automatically converting insecure HTTP requests into HTTPS requests for all users....
1 13 14 15 16 17 32