Gender & Violence in Cyberspace: Why Are Women the Most Vulnerable?
The Budapest Convention emphasizes the protection of women against…
The Rising Industrialization of Cybercrime on the Dark Web
It should come as no surprise to anyone that the proliferation…
Online Security
Online security is something most of us use on a daily basis…
Cyber Espionage: An Overview
Spying for political or economic gains is not new and it is…
Is Nigeria Ready For Cyberwar?
It is on record that Nigeria has expressed willingness to fight…
Chinese hacking group poses as Iranian while conducting cyber espionage in Israel: US Firm
Security firm FireEye reported that a Chinese hacking group…
Inflammation of Israeli-Palestinian Conflict via Social Media
Over the course of eleven days in May 2021, Hamas and Israel…
Threats Emanating from Cyberspace to Nuclear Command, Control and Communication Systems
The Nuclear Command, Control and Communication systems (C3)…
The pitfalls of ID verification on social media websites
The idea that there should be mandatory verification via some…
Romania is vice-champion at the European Cyber Security
CERT-RO The National Response Center for Cyber Security Incidents…
Cyber Defence in Deep: Designing the Cyber Security Agency Organisation for Turkey
An academic article published about Turkey on "Journal of Naval…
It’s time for NAC to take a NAP
Disclaimer: This article is an editorial opinion and is not exhaustive…