
Dipayan Ghosh
Articles
-
Jan 23, 2025 |
onlinelibrary.wiley.com | Dipayan Ghosh |Neha Chaudhary |Darshan Gupta |Anitika Kundu
Supporting Information As a service to our authors and readers, this journal provides supporting information supplied by the authors. Such materials are peer reviewed and may be re-organized for online delivery, but are not copy-edited or typeset. Technical support issues arising from supporting information (other than missing files) should be addressed to the authors. Filename Description cbdv202402278-s1-Supplementary_material.pdf872.8 KB Supplementary
-
Jan 7, 2025 |
medium.com | Dipayan Ghosh
Dipayan Ghosh·Follow10 min read·--Authored by: Dipayan GhoshVirtual assistants (VAs), like Siri and Google Assistant, have become a huge part of our lives, helping us set reminders, get directions, play music, and much more — just by using our voice. They’re convenient and make life easier, especially with how busy things are these days. But there’s another side to VAs that we need to pay attention to: they gather a lot of personal data, which can raise some privacy and security concerns.
-
Nov 8, 2024 |
medium.com | Dipayan Ghosh
Dipayan Ghosh·Follow5 min read·--In today’s digital world, our personal information is increasingly exposed to cybercriminals, and one of the most dangerous places where it can end up is the dark web. The dark web is a hidden part of the internet that is often used for illegal activities, including the buying and selling of stolen personal data.
-
Oct 22, 2024 |
medium.com | Dipayan Ghosh
Dipayan Ghosh·Follow5 min read·--In an era where cyber threats evolve faster than ever, traditional security models are proving inadequate. With the rapid adoption of cloud services, mobile devices, and remote work, organizations are facing unprecedented challenges in securing their networks. Enter Zero Trust Security, a revolutionary approach that’s transforming the cybersecurity landscape.
-
Sep 23, 2024 |
medium.com | Dipayan Ghosh
A supply chain attack involves compromising a supplier to insert harmful elements into a product before it reaches the end user. In this case, the pagers were likely tampered with at the source, making them dangerous devices. Hezbollah received around 1,000 pagers developed by a Taiwanese company, Gold Apollo, which claimed that the devices were actually manufactured by a Budapest firm, BAC Consulting KFT.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →