Blog

Hacking Facebook Accounts

Facebook is used by nearly a sixth of the world’s population. This large number of Facebook users are vulnerable to information security attacks....

Ransomware Attacks on Law Firms

Since 2015, information security specialists have been stressing that the number of ransomware attacks against law firms has increased...

New Wave of Cyber-attacks on Banks

© CC0 Public Domain   In the past two years, the financial world has been stunned by three major cyber-attacks on banks which were committed...

Information Security Vulnerabilities of Trains

We published an article entitled “Information Security Vulnerabilities of Trains”. In order to gain access to the article, please...

Tax-evasion hacks

We published an article entitled: “Tax-Evasion Hacks”. In order to gain access to the article, please click here.

Security Vulnerabilities of Internet-Connected Homes

  We published an article entitled “Security Vulnerabilities of Internet-Connected Homes”. In order to gain access to the article, please...

Phishing Attacks Using Public Data

Daniel Dimov published an article entitled “Phishing Attacks Using Public Data”. In order to gain access to the article, please click here.

U.S. government white paper

A reference to an article published by Daniel Dimov was included in a U.S. government white paper. If you would like to see the reference, please...

Singapore Management University

The article “Privacy Implications of the Internet of Things” written by Daniel Dimov was included in a list of recommended readings...

Yale University

The article “Differences in Copyright Enforcement between the US and China” written by Daniel Dimov was included as a recommended...

Information Security of Nanorobots

Daniel published an article entitled “Information Security of Nanorobots”. In order to gain access to the article, please click here. Photo:...

Crowdsensing: State of the Art and Privacy Aspects

Daniel published an article entitled “Crowdsensing: State of the Art and Privacy Aspects” In order to gain access to the article, please click...

Privacy Risks of Sleep-Tracking Devices

Daniel published an article entitled “Privacy Risks of Sleep-Tracking Devices” In order to gain access to the article, please click here. Photo:...

Human-implanted RFID chips

Daniel published an article entitled “Human-implanted RFID chips.” In order to gain access to the article, please click here. Photo: Natia...

The Debate Over Network Neutrality in the EU and the USA

Daniel published an article entitled “The Debate Over Network Neutrality in the EU and the USA.” In order to gain access to the article, please...