Author: Ng S.T. Chong

  • Behind the Screens: The Credibility Challenge of Digital Content Creators

    In an era where social media influencers shape discourse, a UNESCO study, “Behind the Screens,” reveals critical insights into digital content creation landscape, uncovering significant concerns about information accuracy and responsible content creation. The study surveyed 500 content creators from 45 countries and conducted in-depth interviews with 20 creators, all with over 1,000 followers. Digital…

  • Russian Hackers Exploit Weak Wi-Fi Security in Novel “Nearest Neighbor” Attack

    A recent cyberattack by the notorious Russian hacking group APT28 (Fancy Bear/GruesomeLarch) highlights a concerning trend: evolving tactics that exploit vulnerabilities in corporate Wi-Fi security. This sophisticated operation using a novel technique dubbed the “nearest neighbor attack,” detected on February 4, 2022, demonstrates the need for organizations to strengthen their wireless defenses and consider the…

  • The Coding Crossroads: Navigating Tech’s New Landscape in the AI Era

    The tech world is experiencing a seismic shift. What was once considered a guaranteed path to career success—learning to code through intensive boot camps—is now facing unprecedented challenges. The rise of artificial intelligence is dramatically reshaping the landscape for aspiring programmers, and the traditional “learn to code” advice is no longer a simple solution. A…

  • Large Language Models in Vulnerability Research: Opportunities and Responsibilities

    The cybersecurity landscape is experiencing a transformative shift with the emergence of Large Language Models (LLMs). AI systems have shown remarkable potential across various domains, and their application in vulnerability research holds both exciting opportunities and significant responsibilities for the security community. Gemini 1.5 Pro is a prime example of these advancements, offering a striking…