top of page
Profile
Join date: Feb 6, 2026
Posts (3)
May 1, 2026 ∙ 3 min
Social Engineering
AttacksHacking humans instead of systems Article Written By: Iyithihya Prakasan Article Designed by: Iyithihya Prakasan and Natasha Gumpula What is Social Engineering? Social engineering (IBM) attacks work their way to orchestrate individuals to part with information that they are not supposed to share, install software that they are not supposed to install, open web pages that they are not supposed to visit, send money to criminals, or commit other errors that jeopardize their personal or...
6
0
Apr 9, 2026 ∙ 3 min
Cybersecurity Requirements for Remote Operations (6G & Tele-surgery)
Protection of Patients Safety and Data Integrity in Next-Generation Medical Netw Article Written By: Iyithihya Prakasan Article Designed by: Iyithihya Prakasan and Natasha Gumpula With the technological development of remote surgery , a physician can soon remotely control robotic tools with super-speedy networks such as 6G . To ensure this works safely, then we can use good cybersecurity to ensure protection of patients, doctors and the complete system at large. Image from Pinterest The...
9
0
1
Feb 6, 2026 ∙ 3 min
Cyber Security for Cardiac Devices
Article Written By: Iyithihya Prakasan Article Designed By: Iyithihya Prakasan & Sanvi Desai Ever wondered about the possibilities of a pacemaker being a threat? What is the purpose of a pacemaker in the human body? A pacemaker is a device that helps you regulate the timing and sequence of your heartbeat. It cannot exactly replace your heart but can help regulate your heartbeat artificially. Image from verywell health Functioning of pacemakers Once installed, the pacemaker monitors your...
70
2
8
Iyithihya Prakasan
Writer
More actions
bottom of page
