Sign in

Cybersecurity | Artificial Intelligence | Blockchain

The Trusted Execution Environments are one of the technologies that help manufacturers, service providers, and consumers protect their devices and sensitive data. TEE protects the area of the hardware where the code is executed in isolation. The code executed in the trusted execution environment cannot be viewed or modified, so an attacker would only be able to execute malicious code with full privileges on the same processor.

Zero-knowledge proof systems that have received a lot of attention since their introduction are those that use a single message, such as proof of the existence of zero-knowledge or proof against a certain type of proof.

What is it?

What are the must-have properties?

The billions of login credentials available on the dark web make it easy for cybercriminals to steal login credentials. It has been widely reported that automated access data — the plug-in attack that has found its way onto the internet — is hitting systems such as credit cards, bank accounts, and credit card numbers.


As with all emerging technologies, blockchain faces a number of challenges that will lead to its broader implementation. As with any new technology, compliance with existing data standards in terms of security, privacy, and information sharing could prove to be the first hurdle for blockchain in telecommunications. Cryptographically immutable automation systems, whose blockchain technology ensures that participants are protected and trusted, will also address the inherent challenges associated with the abundance of data that suddenly flows abundantly across countless devices. Knowing this information will use blockchain applications as a secure identity system that solves many of the problems of distributed systems such as eSIM.


Any time an organization deploys a new app, end-users need to build a new set of credentials to recall. The outcome for staff? Too many passwords to remember. In reality, the average user needs to recall at least ten passwords a day but s/he forgets up to three of them every month.

In computer security, a cold boot attack is a type of side-channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s random access memory by performing a hard reset of the target machine.

F-Secure — Available on

It is clear that something must be done to help the security community assess, test, and control the level of security of embedded systems. Infected targets consume more power than a cleaned target device because the malware performs additional computing tasks that require additional power to the target device’s processor.

This year, definitely, no one has had a break from cyber-attackers. Even Covid-19 couldn’t stop them. Quite the opposite, during the pandemic, the attacks were increased dramatically. Data breaches, network penetrations, data and identity theft, and ransomware outbreaks have all taken place in 2020.


The overall goal of the dynamical system at any layer is to make the best prediction of the representation in the layer below using the top-down information from the layers above and the temporal information from the previous states.

Annual costs from ransomware attacks are estimated to exceed $ 20 billion by 2021, according to the Cybersecurity Ventures report. While many companies mistakenly believe that they are too small to be a target, the statics show the other way.

What is Ransomware?

Ensar Seker

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store