The adoption of decentralized, tamper-proof ledger systems is paving the...
Cybercrime is continuously growing in numbers and becoming more
sophisti...
Programming errors in Ethereum smart contracts can result in catastrophi...
Many malware campaigns use Microsoft (MS) Office documents as droppers t...
The financial crime landscape is evolving along with the digitization in...
A crucial technical challenge for cybercriminals is to keep control over...
As the digitization of information-intensive processes gains momentum in...
Human beings produce electronic waste (e-waste) at an unprecedented pace...
Nowadays, malware campaigns have reached a high level of sophistication,...
The current landscape of the core Internet technologies shows considerab...
There is a continuous increase in the sophistication that modern malware...
Blockchain's evolution during the past decade is astonishing: from bitco...
Modern malware can take various forms, and has reached a very high level...
As the size and source of network traffic increase, so does the challeng...
In this article, we explain in detail the internal structures and databa...