{"id":310,"date":"2022-09-21T10:03:04","date_gmt":"2022-09-21T10:03:04","guid":{"rendered":"https:\/\/recypher.lums.edu.pk\/?p=310"},"modified":"2022-09-21T10:03:44","modified_gmt":"2022-09-21T10:03:44","slug":"highlights-from-cyberly-secured-weekly-workshop-series","status":"publish","type":"post","link":"https:\/\/recypher.lums.edu.pk\/index.php\/2022\/09\/21\/highlights-from-cyberly-secured-weekly-workshop-series\/","title":{"rendered":"Highlights from\u00a0Cyberly Secured \u2013 Weekly workshop series"},"content":{"rendered":"\n<p>Session 1:<br>The introductory session of the \u2018Cyberly Secured\u2019 series of workshops was held in collaboration with National Center for Cyber Security (NCCS), NED University on 14-Sep-2022.<\/p>\n\n\n\n<p>Highlights:<br>The highlight of the session was the live demo of data recovery by the Digital Forensics Expert from NCCS. They recovered even the WhatsApp chats and voice messages apart from images with their geotags and time-stamps, and from company reset phones as well as storage devices that had been overwritten and formatted multiple times. Scary!<\/p>\n\n\n\n<p>Takeaway:<br>The takeaway was safe electronic waste management. We should be careful about what we put on any digital media and should never sell our cell phones, USB sticks, etc. If the old devices cannot be \u2018Archived\u2019 they must be physically broken down and thrown in chunks at multiple places on different days.<\/p>\n\n\n\n<figure class=\"wp-container-2 wp-block-gallery-1 wp-block-gallery has-nested-images columns-default is-cropped\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"819\" height=\"1024\" data-id=\"311\"  src=\"https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n-819x1024.jpg\" alt=\"\" class=\"wp-image-311\" srcset=\"https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n-819x1024.jpg 819w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n-600x750.jpg 600w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n-240x300.jpg 240w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n-768x960.jpg 768w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/307280159_190978706679887_4299431821321254993_n.jpg 960w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"819\" height=\"1024\" data-id=\"313\"  src=\"https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n-819x1024.jpg\" alt=\"\" class=\"wp-image-313\" srcset=\"https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n-819x1024.jpg 819w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n-600x750.jpg 600w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n-240x300.jpg 240w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n-768x960.jpg 768w, https:\/\/recypher.lums.edu.pk\/wp-content\/uploads\/2022\/09\/306870588_621008769421873_5280794697458924132_n.jpg 960w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>Next session \u2013 21-Sep-2022 | 1:00PM-2:00PM | MTS-7 | IBA MC<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Session 1:The introductory session of the \u2018Cyberly Secured\u2019 series of workshops was held in collaboration with National Center for Cyber Security (NCCS), NED University on 14-Sep-2022. Highlights:The highlight of the session was the live demo of data recovery by the Digital Forensics Expert from NCCS. They recovered even the WhatsApp [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[20],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/posts\/310"}],"collection":[{"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":1,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/posts\/310\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/recypher.lums.edu.pk\/index.php\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}