10 episodes

Nominated as Top Artificial Intelligence (AI) Podcast by Threat.Technology.

Former name: "Latest Techs - Stay updated!"

This podcast gives you an exciting tour of the latest technologies being explored by the whole world to make them smarter. We talk about AI Security, Machine Learning, Digital Forensics, and other various tools & technologies that are essential in development, security, and investigation especially. Furthermore, you will get the answers regarding the use of technologies like Artificial Intelligence, Docker containers, Digital Forensics tools, etc in improving security frameworks, efficiency, and ease of the operation of available services. We believe in the "kaizen" concept - continuous learning, continuous growth.

Xploring Digital World Anant Gangwar

    • Technology

Nominated as Top Artificial Intelligence (AI) Podcast by Threat.Technology.

Former name: "Latest Techs - Stay updated!"

This podcast gives you an exciting tour of the latest technologies being explored by the whole world to make them smarter. We talk about AI Security, Machine Learning, Digital Forensics, and other various tools & technologies that are essential in development, security, and investigation especially. Furthermore, you will get the answers regarding the use of technologies like Artificial Intelligence, Docker containers, Digital Forensics tools, etc in improving security frameworks, efficiency, and ease of the operation of available services. We believe in the "kaizen" concept - continuous learning, continuous growth.

    Robots Security and Blockchain Swarm

    Robots Security and Blockchain Swarm

    Robot swarms could greatly benefit from shared knowledge. Decisions could be based on a shared view of the world. The ARGoS robot simulator is the state-of-the-art research platform to conduct simulations in swarm robotics. Each robot acts as an Ethereum blockchain node, maintaining a custom Ethereum network. The interface is intended to facilitate research in blockchain-based robot swarms by allowing Ethereum functions in ARGoS.

    • 15 min
    Mapping Digital Crimes with Cyber Acts

    Mapping Digital Crimes with Cyber Acts

    Crime mapping is done by analysts in law enforcement agencies to map, visualize, and analyze and correlate data sources to create a detailed picture of crime incidents and related factors within a community or other geographical area.  It is a key component of crime analysis and the CompStat policing strategy. Here I've explained Digital crime mapping with Cyber Acts.

    • 10 min
    JTAG - ChipOff - ISP Forensics - Tools and Challenges

    JTAG - ChipOff - ISP Forensics - Tools and Challenges

    In order to delve as deeply as possible into a mobile device for your forensic investigation, you may need to access the device’s contents on a physical level—creating and sorting through a raw data dump of the smartphone’s NAND or NOR flash memory chips. There are many tools and techniques which allow forensic investigators to obtain this level of access, even if the smartphone is locked. 

    • 12 min
    Forensics of Cloud Machine Learning Platforms

    Forensics of Cloud Machine Learning Platforms

    Machine Learning algorithms enable the investigators to interrogate the vast scattered data sets which are placed in social and wired networks and web or cloud computing. Its pattern recognition software is used to analyze huge amounts of data that are used to predict its current & future behavior. ML Forensics gains the capability to recognize the patterns of criminal activities through ML algorithms, in order to learn from the historical data about when and where the crime will take place.

    • 10 min
    ARVR and Digital Evidences

    ARVR and Digital Evidences

    The latest craze of content sharing suits VR as users can cohabit Virtual Environment and contribute content unique to immersion. When placed in an immersive VR environment, the user's view is completely obstructed from the real world due to the Head Mounted Display. Complete immersion into VR amplifies the consequences of cyberbullying and sexual harassment, where the misconduct “feels all too real”.

    • 10 min
    Malware Analysis using Deep Exploit, REMNux & Cuckoobox

    Malware Analysis using Deep Exploit, REMNux & Cuckoobox

    Malware analysis is the process of learning how malware functions and any potential repercussions of a given malware. Malware code can differ radically, and it's essential to know that malware can have many functionalities. These may come in the form of viruses, worms, spyware, and Trojan horses. Each type of malware gathers information about the infected device without the knowledge, or authorization of the user.

    • 9 min

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Darknet Diaries
Jack Rhysider
freeCodeCamp Podcast
freeCodeCamp.org
Whatsapp
Rami AP
Waveform: The MKBHD Podcast
Vox Media Podcast Network