General security

Weapon of anonymous

Before starting, I would like to give a small preview about the topic. This article focuses on the world famous hacker group, known as "Anonymous." I will be

Doxing: The Dark Side of Reconnaissance

Introduction: [pkadzone zone="main_top"] Doxing is a coin with two sides. Doxing can be used for security, research and collecting proof for investigation i

One-time passwords with token

1. Introduction One-time passwords are used to achieve higher security than traditional static passwords. They're often generated by tokens. This article pre

Fitting cyber attacks to jus ad bellum — Consequence-based approachPart III

I. Criticism and possible flaws of consequence-based approach and seven-factor test There are people from the field of law, and not only, who do not think t

Fitting cyber attacks to jus ad bellum — Consequence-based approach Part II

The consequence-based duo tests The focus of this contribution is placed on two tests which employ the consequence-based approach that, in turn, aims to cat

Fitting cyber attacks to jus ad bellum — Consequence-based approach Part I

Introductory presentation While still reviewing the instrument-based theory, there was a slight allusion at some point that oftentimes from practical reason

Confessions of an Identity Thief – Part 2

The saga continues. Now things get really interesting. In our last episode our identity thief had successfully procured a check made out to the dealership fo

Facebook Technologies

As in any other field, for a win, we should take a look at the successful stories and case studies around us. In this article I would like to talk about opti

How Edward Snowden protected information … and his life

Who is Edward Snowden? Edward Snowden is the man who changed the history of the Internet; he revealed information on the largest and most secret surveillance

Password Auditing Explained

Why Audit?  Harriet Beecher Stowe is credited with the quote "Human nature is above all things lazy" - while I prefer to think of myself as 'efficient' rathe