After a successful PhD defence in Leiden, the Netherlands.

At the office.

With Rod Beckstrom (on the left), former president of ICANN, at the ICANN meeting in Prague.

Blog

Security of Smart Contracts

hands-1445472_640 In today’s globalized world, it is not an unusual occurrence a contract to be concluded by parties located in nine different countries. The resolution of disputes arising out of such international contracts requires significant financial resources, e.g., fees for translating documents in many different languages, court costs, and attorneys’ fees. Extensive investments in dispute resolution schemes are not feasible if the monetary value of the disputes is low. Furthermore, even if such investments are feasible, the contracting parties may not have the financial resources necessary...
Read more 0

Privacy concerns about Pokémon GO

pokemon-1543353_640 Pokémon Go, an augmented reality smartphone game which has recently become a sensation, is created and operated by the software development giant Niantic, Inc. The term “augmented reality” can be defined in simple words as a live view which is supplemented by computer-generated input. Within the first week of its release, Pokémon Go was downloaded about 7.5 million times in the United States alone and received an immense attention from media and millions of game users. To analyze the privacy concerns about Pokémon Go, it is...
Read more 0

Hacking Facebook Accounts

facebook-715811_640Facebook is used by nearly a sixth of the world’s population. This large number of Facebook users are vulnerable to information security attacks. Hacking social media accounts does not require sophisticated skills. By way of illustration, a simple Google search reveals numerous instructions on how to gain unauthorized access to a Facebook account. Hacked Facebook profiles, in combination with user data picked from other sources (e.g., Twitter, LinkedIn, and check-ins), allow criminals to construct a full personal, financial, and behavioral image of their victims that may be further utilized...
Read more 0

Ransomware Attacks on Law Firms

hand-1278398_640 Since 2015, information security specialists have been stressing that the number of ransomware attacks against law firms has increased significantly. Firms providing legal services are attractive targets for ransomware attacks because many of them are ready to pay to cyber criminals to avoid the negative reputational consequences which arise from the failure to protect their clients’ sensitive information. Our article examining the anatomy of ransomware attacks on law firms is available here. Image: © Public Domain (Pixabay)....
Read more 0

New Wave of Cyber-attacks on Banks

In the past two years, the financial world has been stunned by three major cyber-attacks on banks which were committed by (1) utilising the digital infrastructure of the targeted banks and (2) exploiting weaknesses in the systems that connect banks to the global SWIFT network. Our new article discusses the modus operandi of  (1) the attack on Ecuadorian Banco del Austro in January 2015, (2) the attack on Vietnam’s Tien Phong Commercial Joint Stock Bank in May 2015, and (3) the attack on Bangladesh Central Bank in February 2016. In...
Read more 0

U.S. government white paper

A reference to an article published by Daniel Dimov was included in a U.S. government white paper. If you would like to see the reference, please go to http://www.its.dot.gov/itspac/Dec2014/Smart_Connected_City_FINAL_111314.pdf and look at page 44. ...
Read more 0