LATEST ARTICLES

Phishing Attacks

PHISHING ATTACKS WHAT IS A PHISHING ATTACK Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit...

Advanced Persistent Threat (Apt)

ADVANCED PERSISTENT THREAT (APT) WHAT IS AN APT An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an...

Penetration Testing

PENETRATION TESTING WHAT IS PENETRATION TESTING A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for...

iPhone 8 and Features

iPhone 8 and Features Apple has commemorated the iPhone’s 10th anniversary with a special edition phone named the iPhone X. The announcement was made at...

Hotspot Crime Prediction System

Predictive system can predict and stop crime before it happens. Using only three data points- crime type, crime location and crime date- predictive system...

Hotspot Crime Prediction

Hotspot Crime Prediction Ilhan TURKMEN The School of Information Technology Cincinnati, United States turkmein@mail.uc.edu Abstract— University campuses might seem very safe due to the friendly atmosphere of thousands of...