After a successful PhD defence in Leiden, the Netherlands.

At the office.

With Rod Beckstrom (on the left), former president of ICANN, at the ICANN meeting in Prague.

Blog

The Future of Information Security

In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field would be. It should be noted that unpredicted emergence of disrupting innovations may radically change the existing information security landscape. Nevertheless, we may reasonably expect that the future of cybersecurity will be dominated by four trends, namely, use of Blockchain technologies (Section 2), expanding the role of artificial intelligence (Section 3), harnessing the wisdom of the crowd (Section...
Read more 0

US-Russia Cyber-Security Unit: Future Reality or Pipe Dream

On 9th of July 2017, the President of the United States, Donald Trump, published the following tweet: “Putin & I discussed forming an impenetrable Cyber-security unit so that election hacking, & many other negative things, will be guarded.” One day later, President Trump published a tweet which poured cold water over the enthusiastic idea about an “impenetrable Cyber-security Unit.” More specifically, the tweet stated: “The fact that President Putin and I discussed a cyber-security unit doesn’t mean I think it can happen. It can’t-but a...
Read more 0

Cybersecurity as an ethical obligation

An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical obligations which, if violated, may lead to sanctions. For example, the Code of Medical Ethics adopted by the American Medical Association sets forth the values to which every physician commits himself/herself as a member of the medical profession. The State Bar of California has issued advisory opinions regarding the ethicality of hypothetical attorney conduct. The advisory opinions cover ethicality of attorney blogging,...
Read more 0

US Regions Most Vulnerable to a Cyber Attack

In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten regions (ordered from high to low level of vulnerability) are as follows: (i) Washington, D.C.; (ii) California; (iii) Florida; (iv) Massachusetts; (v) Nevada; (vi) Illinois; (vii) Texas; (viii) Michigan; (ix) Missouri; and (x) Connecticut. In the following sections, we examine the possible reasons for the inclusion of each of these ten regions in the rank list. In the end, we provide concluding remarks. The...
Read more 0

Malware-as-a-service

In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, Saudi Telecom Company, and FedEx (an international courier delivery services company). The ransomware attack is now estimated to be one of the largest global security incidents in the history of the Web. The full article is...
Read more 0

PhD Defence

Daniel will defend his PhD dissertation on 27th of June 2017. The dissertation aims to examine whether Crowdsourced Online Dispute Resolution (CODR) can fairly resolve disputes. First, it provides a framework of CODR, analyses the differences between CODR and other dispute resolution schemes, and constructs an interpretation of procedural fairness that merges objective and subjective procedural fairness. Second, the dissertation investigates whether the current CODR procedures are fair and proposes a model of a CODR procedure that complies with the interpretation of procedural fairness. For...
Read more 0

Security Concerns of Flying Motorcycles

Flying motorcycles resembling the flying machines from Star Wars are about to be placed on the market. A number of developers are working on designing large-scale aerial platforms that can lift and carry humans and heavy packages. Simpler than helicopters and convenient as motorbikes, flying motorcycles may expand the range of transportation means in the future. However, since such machines are equipped with a number of sophisticated sensors and advanced operating software, they can be susceptible to cyber threats. The full article is available Read more 0

2016 Trends in Ransomware

computer-1591018_640Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good profits it provides to criminals. One of the reasons for the proliferation of ransomware is its diversity. Since ransomware constantly evolves in more sophisticated forms, organizations that do not follow the development of this particularly dangerous form of malware often find their computer networks completely paralyzed by it. If you would like to read the entire article, please click...
Read more 0

Technologies for Conducting Privacy Compliance Assessments

login-1203603_640 Most jurisdictions worldwide have developed comprehensive privacy laws which impose a number of obligations on organizations collecting personal data. However, the processes of ensuring compliance with privacy laws may be complex, lengthy, and costly. This is because such compliance work is usually undertaken by highly qualified experts, who need to examine in detail organizations’ flow of personal data across its lifecycle, from collection to disposal. Therefore, there is a pressing social need for technological solutions which facilitate such privacy compliance.   The full article is available here . Image:...
Read more 0

The End of Bitcoin Ransomware?

bitcoin-1368256_640Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for goods and services, but also as a means to collect ransomware. The reason why ransomware creators use the virtual currency is the anonymity that Bitcoin provides, i.e., one can conduct Bitcoin transactions without the need to use his/her real name. In this regard, an FBI report on ransomware issued in 2015 points out: “Criminals prefer Bitcoin because it’s easy to use, fast, publicly...
Read more 0