Privacy Concerns About Emotional Chatbots

Privacy Concerns About Emotional Chatbots

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the fully commercialized transactional robots... Go on to the site to read the full article ... Read More
Consequences of the Late Announcement of Cyber-security Incidents

Consequences of the Late Announcement of Cyber-security Incidents

Introduction Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of... Go on to the site to read the full article ... Read More
Tips for Drafting Efficient Employee Information Security Policies

Tips for Drafting Efficient Employee Information Security Policies

/ / General Security
1. Introduction Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such policies usually contain instructions on... Go on to the site to read the full article ... Read More
How to Avoid Phishing on LinkedIn

How to Avoid Phishing on LinkedIn

/ / Phishing
Section 1. Real LinkedIn phishing attacks 1.1 LinkedIn attacks asking users to upload their CVs In April 2017, scammers started sending phishing messages to LinkedIn users asking them to upload their... Go on to the site to read the full article ... Read More
Top 5 Smartest Malware Programs

Top 5 Smartest Malware Programs

/ / Malware Analysis
1. Introduction The growing threat of malware is one of the biggest Cyber Security threats of today. Malware is a term that encompasses a plethora of covert, intrusive software. This includes items... Go on to the site to read the full article ... Read More
The Future of Information Security

The Future of Information Security

/ / General Security
1. Introduction In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field would be. It should be noted that... Go on to the site to read the full article ... Read More
US-Russia Cyber-Security Unit: Future Reality or Pipe Dream

US-Russia Cyber-Security Unit: Future Reality or Pipe Dream

/ / General Security
Section 1. Introduction On 9th of July 2017, the President of the United States, Donald Trump, published the following tweet: “Putin & I discussed forming an impenetrable Cyber-security... Go on to the site to read the full article ... Read More
Cybersecurity as an ethical obligation

Cybersecurity as an ethical obligation

/ / General Security
1. Introduction An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical obligations which, if violated, may lead to... Go on to the site to read the full article ... Read More
How to Draft an Incident Response Policy

How to Draft an Incident Response Policy

Section 1. Introduction Simultaneously with their growing online presence, companies and individuals become increasingly susceptible to cyber-security attacks. Most organizations prefer to avoid and... Go on to the site to read the full article ... Read More