Shamir Secret Sharing

Walkthrough of the Teaching Aide: Shamir Secret Sharing  “Welcome! Today, we will dive into Shamir’s Secret Sharing”  Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …

EAGERBEE Malware: A New Variant That Targets Middle East.

The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …

Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)

Introduction We are delighted to introduce our group project: Beaver Multiplication Triples in Oblivious Transfer (OT). This project has been completed by A S M Nazimuddoullah and Fahim Uddin Very recently, the Bipartisan Senate AI Working Group pronounced substantially $32 billion per year being requisite [1] for AI safety research which pivots on privacy. A …

THE GROWING THREAT OF RANSOMEWARE ATTACK IN THE HEALTH CARE SECTOR – A CASE OF THE McLAREN HEALTH CARE HOSPITAL ATTACKS.

Ransomware attacks in the Healthcare sector has been on the rise in the past few years, and this may be as a result of what is at stake such as life, legacy system, patient record e.t.c McLaren Health care hospitals has experienced two ransomware attacks in the space of one year. The first rasnsomware attack …

Fact-Checking and Cybersecurity on Facebook: Consequences of Neglect

Meanwhile, Meta has completely dropped its fact-checking program. The latest update regarding moderation policies and practices from the CEO Mark Zuckerberg dated January 07,2025, highlighted a new direction credited by the company to free speech[1]. Critics say the move by Zuckerberg to “get back to our roots around free expression” could open the door to …

THREE QUESTIONS AND ANSWERS ON ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND E-COMMERCE PLATFORMS

2. Given the variability in privacy practices across platforms noted by Bradshaw et al. (2020), what steps can regulatory bodies take to ensure more consistent application of privacy standards?Answer: To address the inconsistencies highlighted by Bradshaw et al. (2020), regulatory bodies could create more unified, global standards for privacy policies, perhaps extending the principles of …

(Teaching Aide) ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM

INTRODUCTION1.1 Background of the studyIn the modern digital age, personal data has become one of the most valuable resources forbusinesses, leading to significant concerns regarding privacy and user security. Platforms suchas social media, email services, and online shopping sites rely heavily on user data to drivetheir business models, often collecting vast amounts of personal information. …

WALKTHROUGH ON ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM

This project is all about expanding our understanding of the complex issues surrounding data privacy, including how policies are written, how engaged users are, what the laws say, and the ethical side of things. It points out the need for easier-to-understand policies, stronger enforcement of regulations, and better education for users to truly protect their …

LinkedIn’s Privacy Controversy: A Wake-Up Call for AI Governance

The world of Cybersecurity and Privacy is continuously growing especially with the introduction and massive growth of AI which causes a discrepancy between innovation and privacy and where exactly to draw the line. A lawsuit has been filed against LinkedIn in California with the allegations of sharing private messages of users under the Premium subscription …