Sign in

Cybersecurity | Artificial Intelligence | Blockchain

Zero-knowledge proof systems that have received a lot of attention since their introduction are those that use a single message, such as proof of the existence of zero-knowledge or proof against a certain type of proof.

A zero-knowledge proof protocol is a way for a prover to convince a verifier that a statement containing classified information is true without revealing even a single bit of information (or a fraction thereof) about that knowledge. This is because the prover can prove the accuracy of the claim to the verifier without providing them with additional information. As a consequence, the verifier nor any passive eavesdropper gains any information from taking part in any number of executions of the protocol. To this end, a non-interactive zero-knowledge proof system contains only one message sent by the prover to the verifier.

The billions of login credentials available on the dark web make it easy for cybercriminals to steal login credentials. It has been widely reported that automated access data — the plug-in attack that has found its way onto the internet — is hitting systems such as credit cards, bank accounts, and credit card numbers.

Credential Stuffing is a technique that involves an automatic injection attack to access online services with stolen credentials. In an attack on the login data, fraudsters use it to access consumer accounts to make fraudulent purchases, carry out phishing attacks and steal information and money.


This attack method is facilitated by a range of off-the-shelf tools which are easily available, making it unsophisticated and relatively straightforward.

Commonly used tools include Sentry MBA, Account Hitman, Vertex, and Apex. To launch an attack, an attacker simply needs their tool of choice, a configuration file for the website to be attacked, and a…

As with all emerging technologies, blockchain faces a number of challenges that will lead to its broader implementation. As with any new technology, compliance with existing data standards in terms of security, privacy, and information sharing could prove to be the first hurdle for blockchain in telecommunications. Cryptographically immutable automation systems, whose blockchain technology ensures that participants are protected and trusted, will also address the inherent challenges associated with the abundance of data that suddenly flows abundantly across countless devices. Knowing this information will use blockchain applications as a secure identity system that solves many of the problems of distributed systems such as eSIM.

As its name suggests, the embedded SIM card or eSIM is built into the phone’s board.


eSIM will help operators and their customers to develop new business models and open up new business opportunities.

Telecommunications group Verizon is considering using blockchain technology to bolster the dynamic creation of virtual SIM cards. Contrary to the headlines, Verizon is not the first provider to try to use blockchain technology for a SIM card.

A 5G blockchain eSIM technology jointly developed by China Unicom, Gotell, and Webank was officially approved by the GSMA organization and officially released on April 20, 2020.

The existing…

Any time an organization deploys a new app, end-users need to build a new set of credentials to recall. The outcome for staff? Too many passwords to remember. In reality, the average user needs to recall at least ten passwords a day but s/he forgets up to three of them every month.

The evolving challenges in identity management, in particular those related to identity theft, fraud, and other forms of identity abuse, have led to a new approach to identity management, now known as Federative Identity Management (FIM). Federated Identity Management is a relatively new concept that is part of an ongoing trend in identity management, an automated approach to managing identities such as passports, driving licenses, social security numbers, birth certificates, etc. …

In computer security, a cold boot attack is a type of side-channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s random access memory by performing a hard reset of the target machine.

F-Secure — Available on

Security researchers have discovered a new technique for stealing sensitive data on computers and will detail how cold-start attacks can use computer firmware to allow attackers to recover passwords, credit card numbers, and other sensitive information stored in them. As we have known since 2008, cold-start attacks on encryption keys or cold-start attacks can steal the encryption key of a computer from an attacker with physical access to a machine, which remains briefly in memory after a hard reboot. …

It is clear that something must be done to help the security community assess, test, and control the level of security of embedded systems. Infected targets consume more power than a cleaned target device because the malware performs additional computing tasks that require additional power to the target device’s processor.

The machine learning module can detect malware by analyzing the aggregate power consumption of FPGA hardware. For example, it can detect 60 Hz network activity periods that can correspond to RAM scraping malware. The server can then perform an analysis of power consumption, memory consumption, and memory usage by the API calls.

The first step is to find the leading Application Programming Interfaces (APIs) that lead to the creation of the malware and its execution on the FPGA hardware.

Collecting more API calls that can provide more information about the malware, and finding complex relationships between API calls can improve…

This year, definitely, no one has had a break from cyber-attackers. Even Covid-19 couldn’t stop them. Quite the opposite, during the pandemic, the attacks were increased dramatically. Data breaches, network penetrations, data and identity theft, and ransomware outbreaks have all taken place in 2020.

The overall goal of the dynamical system at any layer is to make the best prediction of the representation in the layer below using the top-down information from the layers above and the temporal information from the previous states.

The brain is thought to seek to minimize value differences, and artificial networks are capable of both driving connections and conveying predictive information.

Computer models of predictive coding neuroscience can offer predictive capabilities and be classified into hierarchical deep neural networks. I think there is a very important feature of machine learning, namely the prerogative of a predictive neural network. Because of this characteristic, these networks are unable to perform effective incremental learning and are therefore unable to convey real predictable trust in the signal. The model is used to generate predictions of sensory input that are compared to actual…

Annual costs from ransomware attacks are estimated to exceed $ 20 billion by 2021, according to the Cybersecurity Ventures report. While many companies mistakenly believe that they are too small to be a target, the statics show the other way.

Cybercriminals use encrypted ransomware that has become the most common type because it is difficult to crack the encryption and remove the malware.

Ransomware virus encrypts the files as if they were actively encrypted, but actually, they are hidden in a separate file, which waits for a defined set of conditions to be unlocked before they are decrypted. In the case of ransomware, the viruses can encrypt files without the knowledge or consent of the user. …

The Global Cybersecurity Index (GCI) is an organization authorized by ITU to investigate cybersecurity levels in the use of information and communication technologies. It determines the studies and efforts of countries and cybersecurity levels.

GCI reveals a report by determining the legal regulations of the countries on cybersecurity, national strategies, determined standards, certifications, training, awareness, and coordination capabilities of cybersecurity teams. Within the formation, a fiction is formed by inviting the member states by the GCI in order to evaluate their national strategies and their situation regarding cybersecurity within the scope of the industry and private sector. The ultimate goal of this fiction is to create a global-scale cybersecurity culture and to act as an incentive for the integration of this culture into information and communication technologies. …

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store