General security

Social Media use in the Military Sector

Introduction Social media has assumed a fundamental role in today's society. It is a technology with the highest penetration level, as billions of people are

MetaData and Information Security

Information security and penetration testing is not limited to find the vulnerabilities on the website and network; it is an interesting profession that cove

Invoking Article 51 (self-defense) of the UN Charter in Response to Cyber Attacks – II

Cyber attacks through the perspective of the armed attack notion A cyber attack cannot rise to the level of an armed attack as prescribed in Article 51 "bec

Invoking Article 51 (self-defense) of the UN Charter in Response to Cyber Attacks - I

Introduction Among the series of problems with regard to the legal regulation of cyber attacks is how the self-defense doctrine applies to them. In itself, t

Restricting social media at work

Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers.

Tips and Tricks for Using Two-Factor Authentication Technology

Large corporations have been employing two-factor authentication and multi-factor authentication for years to protect against customer identity theft, fraud,

Using Technology To Enhance Public Safety

This article is focused on the sport football (or soccer in the USA). Nevertheless, the same technology and security measures can be applied in virtually any

Identity Theft: The Means, Methods and Recourse

Introduction Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity

Hide your Online Identity with Whonix

The primary reason for writing this is to educate journalists and investigators who want to fight crime anonymously. However, the contents of this article ca

Fun with email headers

Email is still, to this day, the most used method of online communication. Even though many people predicted email would eventually get replaced by instant m