Category Archives: Blog

US Regions Most Vulnerable to a Cyber Attack

In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten regions (ordered from high to low level of vulnerability) are as follows: (i) Washington, D.C.; (ii) California; (iii) Florida; (iv) Massachusetts; (v) Nevada; (vi) Illinois; (vii) Texas; (viii) Michigan; (ix) Missouri; and (x) Connecticut. In the following sections, we examine the possible reasons for the inclusion of each of these ten regions in the rank list. In the end, we provide concluding remarks. The...
Read more 0

Malware-as-a-service

In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, Saudi Telecom Company, and FedEx (an international courier delivery services company). The ransomware attack is now estimated to be one of the largest global security incidents in the history of the Web. The full article is...
Read more 0

PhD Defence

Daniel will defend his PhD dissertation on 27th of June 2017. The dissertation aims to examine whether Crowdsourced Online Dispute Resolution (CODR) can fairly resolve disputes. First, it provides a framework of CODR, analyses the differences between CODR and other dispute resolution schemes, and constructs an interpretation of procedural fairness that merges objective and subjective procedural fairness. Second, the dissertation investigates whether the current CODR procedures are fair and proposes a model of a CODR procedure that complies with the interpretation of procedural fairness. For...
Read more 0

Security Concerns of Flying Motorcycles

Flying motorcycles resembling the flying machines from Star Wars are about to be placed on the market. A number of developers are working on designing large-scale aerial platforms that can lift and carry humans and heavy packages. Simpler than helicopters and convenient as motorbikes, flying motorcycles may expand the range of transportation means in the future. However, since such machines are equipped with a number of sophisticated sensors and advanced operating software, they can be susceptible to cyber threats. The full article is available Read more 0

2016 Trends in Ransomware

computer-1591018_640Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good profits it provides to criminals. One of the reasons for the proliferation of ransomware is its diversity. Since ransomware constantly evolves in more sophisticated forms, organizations that do not follow the development of this particularly dangerous form of malware often find their computer networks completely paralyzed by it. If you would like to read the entire article, please click...
Read more 0

Technologies for Conducting Privacy Compliance Assessments

login-1203603_640 Most jurisdictions worldwide have developed comprehensive privacy laws which impose a number of obligations on organizations collecting personal data. However, the processes of ensuring compliance with privacy laws may be complex, lengthy, and costly. This is because such compliance work is usually undertaken by highly qualified experts, who need to examine in detail organizations’ flow of personal data across its lifecycle, from collection to disposal. Therefore, there is a pressing social need for technological solutions which facilitate such privacy compliance.   The full article is available here . Image:...
Read more 0

The End of Bitcoin Ransomware?

bitcoin-1368256_640Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for goods and services, but also as a means to collect ransomware. The reason why ransomware creators use the virtual currency is the anonymity that Bitcoin provides, i.e., one can conduct Bitcoin transactions without the need to use his/her real name. In this regard, an FBI report on ransomware issued in 2015 points out: “Criminals prefer Bitcoin because it’s easy to use, fast, publicly...
Read more 0

Security of Smart Contracts

hands-1445472_640 In today’s globalized world, it is not an unusual occurrence a contract to be concluded by parties located in nine different countries. The resolution of disputes arising out of such international contracts requires significant financial resources, e.g., fees for translating documents in many different languages, court costs, and attorneys’ fees. Extensive investments in dispute resolution schemes are not feasible if the monetary value of the disputes is low. Furthermore, even if such investments are feasible, the contracting parties may not have the financial resources necessary...
Read more 0

Privacy concerns about Pokémon GO

pokemon-1543353_640 Pokémon Go, an augmented reality smartphone game which has recently become a sensation, is created and operated by the software development giant Niantic, Inc. The term “augmented reality” can be defined in simple words as a live view which is supplemented by computer-generated input. Within the first week of its release, Pokémon Go was downloaded about 7.5 million times in the United States alone and received an immense attention from media and millions of game users. To analyze the privacy concerns about Pokémon Go, it is...
Read more 0

Hacking Facebook Accounts

facebook-715811_640Facebook is used by nearly a sixth of the world’s population. This large number of Facebook users are vulnerable to information security attacks. Hacking social media accounts does not require sophisticated skills. By way of illustration, a simple Google search reveals numerous instructions on how to gain unauthorized access to a Facebook account. Hacked Facebook profiles, in combination with user data picked from other sources (e.g., Twitter, LinkedIn, and check-ins), allow criminals to construct a full personal, financial, and behavioral image of their victims that may be further utilized...
Read more 0