by : JOSH LAKESPECIALIST IN SECURITY, PRIVACY AND ENCRYPTION Aug 26, 2020
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths...
Mar 11, 2019
A group of young activists backed by the Kremlin and known for their efforts in cracking down on homosexuality in Russia has taken on a new cause: curbing a wave of teen “suicide games” on the internet.
“It is important for us to make...
by : Kristina Davis, San Diego Union-Tribune Dec 29, 2015
Cyber crime is so prevalent that cyber investigations are now handled by nearly every law enforcement agency...
Analytics
Nov 02, 2021
Given the rapid acceleration of digital hazards, little work has been carried out into the subject's institutions or procedures that could help to guide scientists and specialists in Information Systems that handle digital security...
by : Sergii Kavun, Ivan Sorbat, Irina Sorbat Aug 30, 2013
The article studies the problems of improving the degree of information security in the distance learning systems (DLS) at the expense of using innovative methods and technologies of information security systems (ISS).
In this article are also...
Jul 11, 2008
Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, reported on July 7 that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly...
Interviews
Nov 02, 2021
On the work of a Cybercrime Investigator with the State Security Service of the Republic of Azerbaijan..
by : Robert McMillan, IDG News Service May 01, 2008
With cybercrime now a global phenomenon, perhaps it will take a global police organization to keep it in check...