News
ReCyP:HER Team Lahore Walled City Tour
September 25, 2022 All of the Recypher project partners, visited Walled city Lahore on September 25, 2022.
September 25, 2022 All of the Recypher project partners, visited Walled city Lahore on September 25, 2022.
September 26 and 27, 2022 LUMS, Lahore ReCYP:HER project partners are meeting at LUMS on September 26 and 27 to discuss the development and enhancement of cybersecurity-related courses to meet the current international standards, strengthen their applied focus, and address Read more…
Session 1:The introductory session of the ‘Cyberly Secured’ series of workshops was held in collaboration with National Center for Cyber Security (NCCS), NED University on 14-Sep-2022. Highlights:The highlight of the session was the live demo of data recovery by the Read more…
Have you ever wondered if you might be making yourself digitally vulnerable? Is there someone who knows more about you than you know yourself? Are your devices digitally secure? Creating Awareness | Digitally Securing Individuals | Building a Cyber-Secure Society. Read more…
The day-long introductory programming workshop ‘From zero to Python programming & scripting with Hedy’ was held successfully at IBA Main Campus, conducted by Dr. Syed Waqar Nabi, from Glasgow University, UK. Due to overwhelming registrations, it was held in hybrid Read more…
This talk was part of a webinar organized by NEPRA under its initiative “Power with Security” with an aim to create awareness amongst the power sector entities against the global risks of cyberattacks. The webinar was led and addressed by Read more…
This paper examines different reasons for web inaccessibility. Prior work on accessibility mostly focuses on censorship by nation-states. We look at three forms of server-side blocking: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor’s Read more…
Internet-wide scanning depends on a notion of liveness: does a target IP address respond to a probe packet? However, the interpretation of such responses, or lack of them, is nuanced and depends on multiple factors, including how we probed, how Read more…
Online social networks support a vibrant ecosystem of third-party apps that get access to the personal information of a large number of users. Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social Read more…
An increasing number of children around the world are spending a significant amount of time online today. Unfiltered access to the Internet exposes them to potential harms, which can have detrimental effects in the crucial stages of their life. Parental Read more…