More: cybersecurity

Domain Typosquatting: Online trademark protection in the name of typing errors

A current report recently published an alarming number: In 2018, users "accidentally" visited CM websites such as itunes.cm or espn.cm and thus came across...

The Growing Threat of Cyber Attacks on Physical Security Systems

As systems connect online, they become hackable, meaning cyber attacks now threaten businesses, governments, and people, even on a physical level. In this blog post,...

Chinese proposals for Metaverse show that we are negotiating for “Cyberterritory”

The latest proposals aimed at regulating the Metaverse, put forward by China Mobile, on July 5 in the International Telecommunications Union’s (ITU) metaverse focus group meeting...

Mounting Cyber Espionage and Hacking Threat from China

Earlier this month a ransomware attack on America’s Prospect Medical Holdings, which operates dozens of hospitals and hundreds of clinics and outpatient centres across...

Digital Sovereignty in Russia and China

Authors: Elena Zinovieva  and Bai Yajie The mounting propensity towards conflict in the digital realm makes national states willing to strengthen their digital borders and...

China between environmental problems and security in cyberspace

Recently, in July, Chinese President Xi Jinping made some considerations regarding ecological and environmental protection. The next five years will be a crucial period...

China’s cyber behavior is reflected in the subsea cables ecosystem

As the world aspires to go digital, integrating economies and transcending boundaries, world’s second largest economy China cannot remain aloof. But China’s actions in...

The GDPR highlights the problem in EU’s Cyber Posture

Any country’s cyber posture is the way in which it intends to react to the developments in cyberspace ranging from cyber threats, cyber-attacks, financial...

Assessing Pakistan’s Cyber Security Landscape

Authors: Gulraiz Iqbal and Ayesha Khalid* Pakistan's history of cyber security policy development can be traced back to early 2000s when the Electronic Transactions Ordinance...

Navigating the New Frontiers of Economic Security: Exploring the Implications of Cyber Threats

The next frontier of economic security in today's interconnected world, where technology drives economies and molds sectors, is the area of cyber risks. The...

Latest

Trump to attend Republican National Convention despite injuries

Despite sustaining injuries in a shooting at a rally...

African Union’s G20 Membership: Effective Collaboration Towards Africa’s Economic Growth

In this interview, Dr. Pradeep S. Mehta,  Secretary General...

CPEC: A Golden Opportunity for Economic Revitalization

China is the second-largest economy, a major economic powerhouse,...

Perception’s Role in Conflict: Understanding and Mitigating its Impact

The human mind is a mystery surpassing horizons. What...
[tds_leads title_text=”Subscribe” input_placeholder=”Email address” btn_horiz_align=”content-horiz-center” pp_checkbox=”yes” pp_msg=”SSd2ZSUyMHJlYWQlMjBhbmQlMjBhY2NlcHQlMjB0aGUlMjAlM0NhJTIwaHJlZiUzRCUyMiUyMyUyMiUzRVByaXZhY3klMjBQb2xpY3klM0MlMkZhJTNFLg==” f_title_font_family=”653″ f_title_font_size=”eyJhbGwiOiIyNCIsInBvcnRyYWl0IjoiMjAiLCJsYW5kc2NhcGUiOiIyMiJ9″ f_title_font_line_height=”1″ f_title_font_weight=”700″ f_title_font_spacing=”-1″ msg_composer=”success” display=”column” gap=”10″ input_padd=”eyJhbGwiOiIxNXB4IDEwcHgiLCJsYW5kc2NhcGUiOiIxMnB4IDhweCIsInBvcnRyYWl0IjoiMTBweCA2cHgifQ==” input_border=”1″ btn_text=”I want in” btn_tdicon=”tdc-font-tdmp tdc-font-tdmp-arrow-right” btn_icon_size=”eyJhbGwiOiIxOSIsImxhbmRzY2FwZSI6IjE3IiwicG9ydHJhaXQiOiIxNSJ9″ btn_icon_space=”eyJhbGwiOiI1IiwicG9ydHJhaXQiOiIzIn0=” btn_radius=”3″ input_radius=”3″ f_msg_font_family=”653″ f_msg_font_size=”eyJhbGwiOiIxMyIsInBvcnRyYWl0IjoiMTIifQ==” f_msg_font_weight=”600″ f_msg_font_line_height=”1.4″ f_input_font_family=”653″ f_input_font_size=”eyJhbGwiOiIxNCIsImxhbmRzY2FwZSI6IjEzIiwicG9ydHJhaXQiOiIxMiJ9″ f_input_font_line_height=”1.2″ f_btn_font_family=”653″ f_input_font_weight=”500″ f_btn_font_size=”eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9″ f_btn_font_line_height=”1.2″ f_btn_font_weight=”700″ f_pp_font_family=”653″ f_pp_font_size=”eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9″ f_pp_font_line_height=”1.2″ pp_check_color=”#000000″ pp_check_color_a=”#ec3535″ pp_check_color_a_h=”#c11f1f” f_btn_font_transform=”uppercase” tdc_css=”eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjQwIiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGUiOnsibWFyZ2luLWJvdHRvbSI6IjM1IiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGVfbWF4X3dpZHRoIjoxMTQwLCJsYW5kc2NhcGVfbWluX3dpZHRoIjoxMDE5LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9″ msg_succ_radius=”2″ btn_bg=”#ec3535″ btn_bg_h=”#c11f1f” title_space=”eyJwb3J0cmFpdCI6IjEyIiwibGFuZHNjYXBlIjoiMTQiLCJhbGwiOiIxOCJ9″ msg_space=”eyJsYW5kc2NhcGUiOiIwIDAgMTJweCJ9″ btn_padd=”eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTBweCJ9″ msg_padd=”eyJwb3J0cmFpdCI6IjZweCAxMHB4In0=”]
spot_imgspot_img