Gender & Violence in Cyberspace: Why Are Women the Most Vulnerable?

The Budapest Convention emphasizes the protection of women against…

The Rising Industrialization of Cybercrime on the Dark Web

It should come as no surprise to anyone that the proliferation…

Online Security

Online security is something most of us use on a daily basis…

Cyber Espionage: An Overview

Spying for political or economic gains is not new and it is…

Is Nigeria Ready For Cyberwar?

It is on record that Nigeria has expressed willingness to fight…

Chinese hacking group poses as Iranian while conducting cyber espionage in Israel: US Firm

Security firm FireEye reported that a Chinese hacking group…

Inflammation of Israeli-Palestinian Conflict via Social Media

Over the course of eleven days in May 2021, Hamas and Israel…

Threats Emanating from Cyberspace to Nuclear Command, Control and Communication Systems

The Nuclear Command, Control and Communication systems (C3)…

The pitfalls of ID verification on social media websites

The idea that there should be mandatory verification via some…

Romania is vice-champion at the European Cyber Security

CERT-RO The National Response Center for Cyber Security Incidents…

Cyber Defence in Deep: Designing the Cyber Security Agency Organisation for Turkey

An academic article published about Turkey on "Journal of Naval…

It’s time for NAC to take a NAP

Disclaimer: This article is an editorial opinion and is not exhaustive…