Typical users are known to use and reuse weak passwords. Yet, as
cyberse...
The collection and use of personal data are becoming more common in toda...
The radical advances in telecommunications and computer science have ena...
Despite the numerous pompous statements regarding 5G, it is indisputable...
Content generation that is both relevant and up to date with the current...
Advanced persistent threats pose a significant challenge for blue teams ...
Cybercrime is continuously growing in numbers and becoming more
sophisti...
The technological advance of drone technology has augmented the existing...
With the continuous rise of malicious campaigns and the exploitation of ...
Programming errors in Ethereum smart contracts can result in catastrophi...
Many malware campaigns use Microsoft (MS) Office documents as droppers t...
In this report, we analyse the latest campaign of Emotet that had a
sign...
A crucial technical challenge for cybercriminals is to keep control over...
As the digitization of information-intensive processes gains momentum in...
Social networks are evolving to engage their users more by providing the...
Nowadays, malware campaigns have reached a high level of sophistication,...
The current landscape of the core Internet technologies shows considerab...
There is a continuous increase in the sophistication that modern malware...
Blockchain's evolution during the past decade is astonishing: from bitco...
Modern malware can take various forms, and has reached a very high level...
As the size and source of network traffic increase, so does the challeng...
Android Notifications can be considered as essential parts in
Human-Smar...
In this article, we explain in detail the internal structures and databa...