Group Members Introduction In an era where data privacy is a growing concern, k-anonymity plays a crucial role in protecting sensitive information while preserving data utility. A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset [1], making it more difficult for …
Category Archives: Uncategorized
AI in Threat Detection for Private Data Breaches : Case Study: Real-World Applications of AI in Threat Detection
In today’s digital age where private data breaches pose significant risks to individuals and organizations alike, the role of Artificial Intelligence (AI) in safeguarding sensitive information has grown significantly. This project provides an overview of how AI identifies, mitigates, and responds to data breach threats more effectively than traditional methods. It will also provide real-world …
Shamir Secret Sharing
Walkthrough of the Teaching Aide: Shamir Secret Sharing “Welcome! Today, we will dive into Shamir’s Secret Sharing” Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …
EAGERBEE Malware: A New Variant That Targets Middle East.
The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …
Continue reading “EAGERBEE Malware: A New Variant That Targets Middle East.”
Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)
Introduction We are delighted to introduce our group project: Beaver Multiplication Triples in Oblivious Transfer (OT). This project has been completed by A S M Nazimuddoullah and Fahim Uddin Very recently, the Bipartisan Senate AI Working Group pronounced substantially $32 billion per year being requisite [1] for AI safety research which pivots on privacy. A …
Continue reading “Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)”
Browser Syncjacking
Browser Syncjacking is an exploit that takes advantage of the google sync functionality of the chrome web browser to hijack a user’s browser. Google sync is used to sync a google account across multiple devices to ensure that what ever you do persist from one device to the next. Malicious actors have found a way …
THE GROWING THREAT OF RANSOMEWARE ATTACK IN THE HEALTH CARE SECTOR – A CASE OF THE McLAREN HEALTH CARE HOSPITAL ATTACKS.
Ransomware attacks in the Healthcare sector has been on the rise in the past few years, and this may be as a result of what is at stake such as life, legacy system, patient record e.t.c McLaren Health care hospitals has experienced two ransomware attacks in the space of one year. The first rasnsomware attack …
Fact-Checking and Cybersecurity on Facebook: Consequences of Neglect
Meanwhile, Meta has completely dropped its fact-checking program. The latest update regarding moderation policies and practices from the CEO Mark Zuckerberg dated January 07,2025, highlighted a new direction credited by the company to free speech[1]. Critics say the move by Zuckerberg to “get back to our roots around free expression” could open the door to …
Continue reading “Fact-Checking and Cybersecurity on Facebook: Consequences of Neglect”
THREE QUESTIONS AND ANSWERS ON ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND E-COMMERCE PLATFORMS
2. Given the variability in privacy practices across platforms noted by Bradshaw et al. (2020), what steps can regulatory bodies take to ensure more consistent application of privacy standards?Answer: To address the inconsistencies highlighted by Bradshaw et al. (2020), regulatory bodies could create more unified, global standards for privacy policies, perhaps extending the principles of …
(Teaching Aide) ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM
INTRODUCTION1.1 Background of the studyIn the modern digital age, personal data has become one of the most valuable resources forbusinesses, leading to significant concerns regarding privacy and user security. Platforms suchas social media, email services, and online shopping sites rely heavily on user data to drivetheir business models, often collecting vast amounts of personal information. …