Celestini Project

Appropriate access: The social engineer must know that the person being targeted has the appropriate credentials to manipulate or access the information or system that is of interest. For example, if a social engineer is attempting to steal confidential information about software being developed by a firm, gaining access into the secretary’s computer may not yield results if the secretary’s

» Read more

Symposium on digital transformative Technologies

The College of Engineering, Design, Art and Technology (CEDAT) at Makerere University, Alcatel-Lucent Bell Labs, Nokia and the Marconi Society will host a Symposium on Transformative Digital Technologies on Wednesday, 3rd February 2016. This symposium will showcase the work carried out by the Celestini Project at CEDAT as well as act as a forum for the discussion of technological breakthroughs

» Read more
1 3 4 5