Blog

GDPR Trolls

Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation...

Consequences of the Late Announcement of Cyber-security Incidents

Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on...

Tips for Drafting Efficient Employee Information Security Policies

Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such...

The Future of Information Security

In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field...

US-Russia Cyber-Security Unit: Future Reality or Pipe Dream

On 9th of July 2017, the President of the United States, Donald Trump, published the following tweet: “Putin & I discussed forming an...

Cybersecurity as an ethical obligation

An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical...

US Regions Most Vulnerable to a Cyber Attack

  In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten...

Malware-as-a-service

  In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries....

PhD Defence

Daniel will defend his PhD dissertation on 27th of June 2017. The dissertation aims to examine whether Crowdsourced Online Dispute Resolution...

Security Concerns of Flying Motorcycles

Flying motorcycles resembling the flying machines from Star Wars are about to be placed on the market. A number of developers are working on...

2016 Trends in Ransomware

Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good...

Technologies for Conducting Privacy Compliance Assessments

Most jurisdictions worldwide have developed comprehensive privacy laws which impose a number of obligations on organizations collecting personal...

The End of Bitcoin Ransomware?

Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for...

Security of Smart Contracts

In today’s globalized world, it is not an unusual occurrence a contract to be concluded by parties located in nine different countries. The...

Privacy concerns about Pokémon GO

Pokémon Go, an augmented reality smartphone game which has recently become a sensation, is created and operated by the software development giant...