General security

Means and Methods of Web Tracking: Its effects on privacy and ways to avoid getting tracked

 1. Introduction Below, we will discuss the reasons that incited people, businesses and governmental agencies to employ web tracking, detailed and basic meth

Fitting cyber attacks to jus ad bellum — Consequence-based approach, Part III

1. Criticism and Possible Flaws of Consequence-Based Approach and Seven-Factor Test There are people from the field of law, and not only from that field, wh

Fitting cyber attacks to jus ad bellum — Target-based approach

I. Essence The target-based is the second approach that theorists and practitioners use to tuck cyber warfare into the unfitting law framework that jus ad be

Confessions of an Identity Thief

Note: This is the first in a series of articles written by a convicted felon currently serving 57 months in a federal correctional institution for identity t

Fitting cyber attacks to jus ad bellum — Instrument-based approach

Introduction The coming of new technologies is challenging to many fields of human activity. In particular, there is a discrepancy between IT and the laws

Using OSINT in Your Business

How could organisations leverage open-source intelligence to gain more insight into their cyber threats? It seems that many organisations, including some of

Near field communication (NFC) technology, vulnerabilities and principal attack schema

The Near Field Communication (NFC) is a set of standards for mobile devices designed to establish radio communication with each other by being touched togeth

Privacy Implications of Google Glass

Introduction Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eye

Security Threats in Virtual World

What are virtual worlds? A virtual world is an online world that simulates the real world in which the 'residents' can interact. Residents can participate i

China vs US, cyber superpowers compared

Introduction In the last months, the press agencies and government official bulletins have reported several news regarding continuous cyber-attacks having Ch