General security

Behind Cyberbullying – Legislation & Coping Strategies

1. Preface: Cyberbullying and Digital Natives Dr. Sameer Hinduja and Dr. Justin Patchin at the Cyberbullying Research Center define cyberbullying as "wilful

Cloud-Based File Sharing Websites: A Data Security Disaster Waiting to Happen?

Have you ever stopped to consider the sensitivity and potential value of the information you have distributed using the many widely available file sharing we

David & Goliath – Winning Strategies in Cyber Warfare

Fortunately fashion is not key to helping us win the Cyber-War because sartorial elegance has never been a strong suit of the IT profession, but David and Go

Privacy and Security Issues for the Usage of Civil Drones

In December, Amazon.com, the world's largest online retailer, announced that it is testing unmanned drones to deliver products ordered by its customers. The

Human-implanted RFID chips

In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as "bugs." The device was a predecessor of the Rad

Jus in Cyber Bello: How the Law of Armed Conflict Regulates Cyber Attacks Part II

Prohibition of Perfidy Article 37 of AP I - Prohibition of perfidy[pkadzone zone="main_top"] 1. It is prohibited to kill, injure or capture an adversary by

Putting Unstructured Data Into Context: What the Cosmos Can Teach Us About Unstructured Data

How is it that something can be so incredibly large and minutely small at the same time? If you're as fascinated by natural science as I am, then you're like

What Good is Tor?

To the uninitiated, Tor, formerly known as The Onion Router, is probably the most popular proxy network for internet anonmyzing. It's called an onion router

3 Cyber Threats, One Simple Solution

Vulnerability management has become a huge challenge in today's malicious cyberspace. SQL Injections, Cross Site Scripting and DDoS Attacks are arguably the

NJVC and InfoSec Institute Partner to Provide Cyber Security Training Services

CHANTILLY, Va., March 18, 2014— NJVC®, an information technology solutions provider headquartered in northern Virginia,  and InfoSec Institute, an informatio