BabaYaga and the Rise of Malware-Destroying Malware

| | Malware Analysis
1. Introduction The team working behind Wordfence (a security plugin for WordPress websites) discovered a new type of malware called BabaYaga. It bears the name of a mythical Slavic creature and... Go on to the site to read the full article ... Read More

Security vulnerabilities of cryptocurrency exchanges

| | General Security
1. Introduction Many experts argue that cryptocurrencies may radically change not only the financial sector but also the way society operates. The reasons provided to support this argument... Go on to the site to read the full article ... Read More

Does the GDPR Threaten the Development of Blockchain?

| | Protecting Privacy
1. Introduction In the last two years, there has been a steady increase in the number of discussions around two important topics. Namely, the new EU law called the General Data Protection Regulation... Go on to the site to read the full article ... Read More

The EU Plans to Adopt a Cybersecurity Certification Framework

| | General Security
1. Introduction At present, there is no EU-wide certification framework that allows suppliers of ICT products to obtain information security certificates valid in all 28 EU countries. For example, if... Go on to the site to read the full article ... Read More

Federal agencies are at high information security risk

1. Introduction Governments all over the world urge private companies to take security measures to protect the personal data of their citizens. For example, the recently adopted EU General Data... Go on to the site to read the full article ... Read More

The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware

1. Introduction ISACA, an international association focused on IT governance, has recently released its annual study “State of Cybersecurity.” The study relates to the year 2018 and is... Go on to the site to read the full article ... Read More

GDPR Trolls

1. Introduction Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation proceedings are complex and... Go on to the site to read the full article ... Read More
Privacy Concerns About Emotional Chatbots

Privacy Concerns About Emotional Chatbots

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the fully commercialized transactional robots... Go on to the site to read the full article ... Read More
Consequences of the Late Announcement of Cyber-security Incidents

Consequences of the Late Announcement of Cyber-security Incidents

Introduction Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of... Go on to the site to read the full article ... Read More
Tips for Drafting Efficient Employee Information Security Policies

Tips for Drafting Efficient Employee Information Security Policies

| | General Security
1. Introduction Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such policies usually contain instructions on... Go on to the site to read the full article ... Read More
Loading...