Press (selected articles)
- Dimov, D. V., ‘Voluntary agreements on blocking are interfering with human rights’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: https://edri.org/edrigramnumber9-15voluntary-blocking-interfere-human-rights/.
- Dimov, D.V. and McNamee, J., ‘Draft Council conclusions on Net Neutrality’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: https://edri.org/edrigramnumber9-15net-neutrality-council-conclusions/.
- Dimov, D.V., ‘EP study on ‘Consumer Behaviour in a Digital Environment’, European Digital Rights (EDRi), Brussels, Belgium, 7 September 2011. Available at: https://edri.org/edrigramnumber9-17consumer-behaviour-digital-environment/.
- Dimov, D.V. and Bradwell, P., ‘New rules on term of protection of music recordings’, European Digital Rights (EDRi), Brussels, Belgium, 21 September 2011. Available at: https://edri.org/edrigramnumber9-18term-extension-music-copyright/.
- McNamee J., Fiedler, K., Humeau, M., Dimov, D.V., ‘EU Surveillance: A summary of current EU surveillance and security measures’ (booklet), European Digital Rights (EDRi), http://www.statewatch.org/news/2012/jan/eu-surveillance-edri.pdf.
- Dimov, D.V. and Van den Herik, J., ‘Използване на краудсоурсинг за разрешаване на спорове’, Bulgarian Legal World Magazine, 22 June 2012. Available at http://www.legalworld.bg/show.php?storyid=27076.
- Dimov, D.V., ‘Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies’, InfoSec Institute, 31 October 2012. Available at http://resources.infosecinstitute.com/bios-anti-theft-technologies/.
- Dimov, D.V., ‘Legal Aspects of Online Gambling’, InfoSec Institute, 13 March 2013. Available at http://resources.infosecinstitute.com/legal-aspects-of-online-gambling/
- Dimov, D.V., ‘Software Patent Law: EU, New Zealand, and the US compared’, InfoSec Institute, 19 April 2013. Available at http://resources.infosecinstitute.com/software-patent-law-eu-new-zealand-and-the-us-compared/.
- Dimov, D.V., ‘E-Money Fraud’, InfoSec Institute, 9 May 2013. Available at http://resources.infosecinstitute.com/e-money-fraud/.
- Dimov, D.V., ‘PayPal: Chargebacks and Dispute Resolution’, InfoSec Institute, 23 May 2013. Available at http://resources.infosecinstitute.com/paypal-chargebacks-and-dispute-resolution/.
- Dimov, D.V., ‘The new Google Maps: a perfect place for review fraud’, InfoSec Institute, 19 June 2013. Available at http://resources.infosecinstitute.com/the-new-google-maps-a-perfect-place-for-review-fraud/.
- Dimov, D.V., ‘The Debate Over Network Neutrality in the EU and the USA,’ InfoSec Institute, 11 February 2014. Available at http://resources.infosecinstitute.com/debate-network-neutrality-eu-usa/
- Dimov, D.V., ‘Ten Important Privacy Threats,’ InfoSec Institute, 18 February 2014. Available at http://resources.infosecinstitute.com/ten-important-privacy-threats/.
- Dimov, D.V., ‘Human-implanted RFID chips,’ InfoSec Institute, 17 April 2014. Available at http://resources.infosecinstitute.com/human-implanted-rfid-chips/.
- Dimov, D.V., ‘Crowdsensing: State of the Art and Privacy Aspects,’ InfoSec Institute, 29 July 2014. Available at http://resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/.
- Dimov, D.V., ‘Privacy Risks of Sleep-Tracking Devices,’ InfoSec Institute, 12 September 2014. Available at http://resources.infosecinstitute.com/privacy-risks-sleep-tracking-devices/.
- Dimov, D.V., ‘Information Security of Nanorobots,’ InfoSec Institute, 14 October 2014. Available at http://resources.infosecinstitute.com/information-security-nanorobots/.
- Dimov, D.V., ‘Chinese Social Media Censorship,’ InfoSec Institute, 15 October 2014. Available at http://resources.infosecinstitute.com/chinese-social-media-censorship/.
- Dimov, D.V., ‘Cyber Attack Protection via Crowdsourcing,’ InfoSec Institute, 23 October 2014. Available at http://resources.infosecinstitute.com/cyber-attack-protection-via-crowdsourcing/.
- Dimov, D.V., ‘Privacy Risks of Beacons,’ InfoSec Institute, 8 December 2014. Available at http://resources.infosecinstitute.com/privacy-risks-beacons/.
- Dimov, D.V., ‘Legality of Jailbreaking Mobile Phones,’ InfoSec Institute, 16 December 2014. Available at http://resources.infosecinstitute.com/legality-jailbreaking-mobile-phones/.
- Dimov, D.V., ‘Information Security Vulnerabilities of Automobiles,’ InfoSec Institute, 13 January 2015. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-automobiles/.
- Dimov, D.V., ‘What US Companies Need to Know about EU Privacy Laws,’ InfoSec Institute, 2 February 2015. Available at http://resources.infosecinstitute.com/us-companies-need-know-eu-privacy-laws/.
- Dimov, D.V., ‘Legality of Electronic Signatures in the EU and the US,’ InfoSec Institute, 5 March 2015. Available at http://resources.infosecinstitute.com/legality-electronic-signatures-eu-us/.
- Dimov, D.V., ‘Side Effects of the New US Net Neutrality Rules,’ InfoSec Institute, 16 April 2015. Available at http://resources.infosecinstitute.com/side-effects-of-the-new-us-net-neutrality-rules/.
- Dimov, D.V., ‘How to Prevent a Domain Name Theft,’ InfoSec Institute, 19 June 2015. Available at http://resources.infosecinstitute.com/how-to-prevent-a-domain-name-theft/
- Dimov, D.V., ‘How to Deal with Reverse Domain Name Hijacking,’ InfoSec Institute, 6 July 2015. Available at http://resources.infosecinstitute.com/how-to-deal-with-reverse-domain-name-hijacking/.
- Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part I,’ InfoSec Institute, 5 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-i/.
- Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part II,’ InfoSec Institute, 19 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-ii/.
- Juzenaite, R., Dimov, D.V., ‘How Security Awareness Can Prevent Romance Fraud,’ InfoSec Institute, 4 September 2015. Available at http://resources.infosecinstitute.com/how-security-awareness-can-prevent-romance-fraud/.
- Juzenaite, R., Dimov, D.V., ‘Crowdsourcing Cybersecurity: How to Raise Security Awareness Through Crowdsourcing,’ InfoSec Institute, 22 September 2015. Available at http://resources.infosecinstitute.com/crowdsourcing-cybersecurity-how-to-raise-security-awareness-through-crowdsourcing/.
- Juzenaite, R., Dimov, D.V., ‘Online Rental Scams,’ InfoSec Institute, 29 September 2015. Available at http://resources.infosecinstitute.com/online-rental-scams/.
- Juzenaite, R., Dimov, D.V., ‘Top 5 Snapchat Security Vulnerabilities,’ InfoSec Institute, 1 October 2015. Available at http://resources.infosecinstitute.com/top-5-snapchat-security-vulnerabilities-how-the-app-learned-its-lessons/.
- Juzenaite, R., Dimov, D.V., ‘Top 7 Types of Hacking Tutorials on YouTube,’ InfoSec Institute, 5 October 2015. Available at http://resources.infosecinstitute.com/top-7-types-of-hacking-tutorials-on-youtube/.
- Juzenaite, R., Dimov, D.V., ‘Smartwatch – A Fashionable and Dangerous Gadget,’ InfoSec Institute, 22 October 2015. Available at http://resources.infosecinstitute.com/smartwatch-a-fashionable-and-dangerous-gadget-10-tips-to-protect-your-smartwatch/.
- Juzenaite, R., Dimov, D.V., ‘Interplanetary Hacking: How the space industry mitigates cyber-threats,’ InfoSec Institute, 27 October 2015. Available at http://resources.infosecinstitute.com/interplanetary-hacking-how-the-space-industry-mitigates-cyber-threats/.
- Juzenaite, R., Dimov, D.V., ‘Password Security: Efficient Protection of Digital Identities,’ InfoSec Institute, 30 October 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/.
- Dimov, D.V., Juzenaite, R., ‘The Most Popular Social Network Phishing Schemes,’ InfoSec Institute, 10 November 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/.
- Juzenaite, R., Dimov, D.V., ‘Security Vulnerabilities of Voice Recognition Technologies’, InfoSec Institute, 7 December 2015. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-voice-recognition-technologies/.
- Dimov, D.V., Juzenaite, R., ‘Budgeting for Security Awareness: Who – What – When – Where – Why – How much’, InfoSec Institute, 10 December 2015. Available at http://resources.infosecinstitute.com/budgeting-for-security-awareness-who-what-when-where-why-how-much/
- Dimov, D.V., Juzenaite, R., ‘Attacks on Hotel Wi-Fi Networks’, InfoSec Institute, 11 December 2015. Available at http://resources.infosecinstitute.com/attacks-on-hotel-wi-fi-networks/.
- Dimov, D.V., Juzenaite, R., ‘Phishing Attacks Using Public Data’, InfoSec Institute, 6 January 2016. Available at http://resources.infosecinstitute.com/phishing-attacks-using-public-data/.
- Dimov, D.V., Juzenaite, R., ‘Legal Issues of New and Emerging Technologies’, InfoSec Institute, 3 February 2016. Available at http://resources.infosecinstitute.com/legal-issues-of-new-and-emerging-technologies/.
- Dimov, D.V., Juzenaite, R., ‘Security Vulnerabilities of Internet-Connected Homes’, InfoSec Institute, 30 March 2016. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-internet-connected-homes/.
- Dimov, D.V., Juzenaite, R., ‘Tax-Evasion Hacks’, InfoSec Institute, 19 April 2016. Available at http://resources.infosecinstitute.com/tax-evasion-hacks/.
- Dimov, D.V., Juzenaite, R., ‘Information Security Vulnerabilities of Trains’, InfoSec Institute, 25 April 2016. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-of-trains/.
- Dimov, D.V., Juzenaite, R., ‘New Wave of Cyber-attacks on Banks’, InfoSec Institute, 9 June 2016. Available at http://resources.infosecinstitute.com/new-wave-of-cyber-attacks-on-banks/.
- Dimov, D.V., Juzenaite, R., ‘Ransomware Attacks on Law Firms’, InfoSec Institute, 11 July 2016. Available at http://resources.infosecinstitute.com/ransomware-attacks-on-law-firms/.
- Dimov, D.V., Juzenaite, R., ‘Privacy Concerns about Pokémon GO’, InfoSec Institute, 1 August 2016. Available at http://resources.infosecinstitute.com/privacy-concerns-about-pokemon-go/.
- Dimov, D.V., Juzenaite, R., ‘Security of Smart Contracts’, InfoSec Institute, 17 August 2016. Available at http://resources.infosecinstitute.com/security-smart-contracts/.
- Dimov, D.V., Juzenaite, R., ‘The End of Bitcoin Ransomware?’, InfoSec Institute, 14 October 2016. Available at http://resources.infosecinstitute.com/the-end-of-bitcoin-ransomware/.
- Dimov, D.V., Juzenaite, R., ‘Technologies for Conducting Privacy Compliance Assessments’, InfoSec Institute, 17 October 2016. Available at http://resources.infosecinstitute.com/technologies-for-conducting-privacy-compliance-assessments/.
- Juzenaite, R., Dimov, D.V., ‘Latest Trends in Cybersquatting,’ InfoSec Institute, 11 January 2017. Available at http://resources.infosecinstitute.com/latest-trends-in-cybersquatting/
- Juzenaite, R., Dimov, D.V., ‘Insurance Against Ransomware Threats,’ InfoSec Institute, 24 February 2017. Available at http://resources.infosecinstitute.com/insurance-ransomware-threats/.
- Juzenaite, R., Dimov, D.V., ‘Security Concerns of Flying Motorcycles,’ InfoSec Institute, 7 April 2017. Available at http://resources.infosecinstitute.com/security-concerns-flying-motorcycles/.
- Dimov, D.V., Juzenaite, R., ‘Why Was Wanacrypt0r 2.0 So Successful?’, InfoSec Institute, 22 May 2017. Available at http://resources.infosecinstitute.com/wanacrypt0r-2-0-successful/.
- Dimov, D.V., Juzenaite, R., ‘Risks and Benefits of Security Policy Templates’, InfoSec Institute, 24 May 2017. Available at http://resources.infosecinstitute.com/risks-benefits-security-policy-templates/.
- Juzenaite, R., Dimov, D.V., ‘Security Risks of Smart E-cigarettes’, InfoSec Institute, 26 May 2017. Available at http://resources.infosecinstitute.com/security-risks-smart-e-cigarettes/.
- Juzenaite, R., Dimov, D.V., ‘How to Recognize Phishing Emails’, InfoSec Institute, 30 May 2017. Available at http://resources.infosecinstitute.com/recognize-phishing-emails/.
- Dimov, D.V., Juzenaite, R., ‘Malware-as-a-service’, InfoSec Institute, 5 June 2017. Available at http://resources.infosecinstitute.com/malware-as-a-service/.
- Dimov, D.V., Juzenaite, R., ‘US Regions Most Vulnerable to a Cyber Attack’, InfoSec Institute, 26 June 2017. Available at http://resources.infosecinstitute.com/us-regions-vulnerable-cyber-attack/.
- Dimov, D.V., Juzenaite, R., ‘“Robin Hood” Ransomware and Psychological Manipulation Techniques’, InfoSec Institute, 29 June 2017. Available at http://resources.infosecinstitute.com/robin-hood-ransomware-psychological-manipulation-techniques/.
- Dimov, D.V., Juzenaite, R., ‘How to Hire Information Security Professionals’, InfoSec Institute, 6 July 2017. Available at http://resources.infosecinstitute.com/hire-information-security-professionals/.
- Dimov, D.V., Juzenaite, R., ‘Innovative Methods of Information Security Training’, InfoSec Institute, 15 September 2017. Available at http://resources.infosecinstitute.com/innovative-methods-information-security-training/.
- Juzenaite, R., Dimov, D.V., ‘How to Draft an Incident Response Policy’, InfoSec Institute, 18 September 2017. Available at http://resources.infosecinstitute.com/draft-incident-response-policy/
- Dimov, D.V., Juzenaite, R., ‘US-Russia Cyber-Security Unit: Future Reality or Pipe Dream’, InfoSec Institute, 1 October 2017. Available at http://resources.infosecinstitute.com/us-russia-cyber-security-unit-future-reality-pipe-dream/.
- Dimov, D.V., Juzenaite, R., ‘The Future of Information Security’, InfoSec Institute, 6 November 2017. Available at https://resources.infosecinstitute.com/future-information-security/.
- Dimov, D.V., Juzenaite, R., ‘Top 5 Smartest Malware Programs’, InfoSec Institute, 22 November 2017. Available at https://resources.infosecinstitute.com/top-5-smartest-malware-programs/.
- Dimov, D.V., Juzenaite, R., ‘How to Avoid Phishing on LinkedIn’, InfoSec Institute, 14 December 2017. Available at https://resources.infosecinstitute.com/avoid-phishing-linkedin/.
- Dimov, D.V., Juzenaite, R., ‘Tips for Drafting Efficient Employee Information Security Policies’, InfoSec Institute, 15 December 2017. Available at https://resources.infosecinstitute.com/tips-drafting-efficient-employee-information-security-policies/.
- Dimov, D.V., Juzenaite, R., ‘Consequences of the Late Announcement of Cyber-security Incidents’, InfoSec Institute, 16 February 2018. Available at https://resources.infosecinstitute.com/tips-drafting-efficient-employee-information-security-policies/.
- Dimov, D.V., Juzenaite, R., ‘Privacy Concerns About Emotional Chatbots’, InfoSec Institute, 16 February 2018. Available at https://resources.infosecinstitute.com/privacy-concerns-emotional-chatbots/.
- Dimov, D.V., Juzenaite, R., ‘GDPR Trolls’, InfoSec Institute, 31 May 2018. Available at https://resources.infosecinstitute.com/gdpr-trolls/.
- Dimov, D.V., Juzenaite, R., ‘The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware’, InfoSec Institute, 14 June 2018. Available at https://resources.infosecinstitute.com/the-decline-of-ransomware-and-the-rise-of-cryptocurrency-mining-malware/.
- Dimov, D.V., Juzenaite, R., ‘Federal agencies are at high information security risk’, InfoSec Institute, 15 June 2018. Available at https://resources.infosecinstitute.com/federal-agencies-are-at-high-information-security-risk/.
- Dimov, D.V., Juzenaite, R., ‘The EU Plans to Adopt a Cybersecurity Certification Framework’, InfoSec Institute, 15 June 2018. Available at https://resources.infosecinstitute.com/the-eu-plans-to-adopt-a-cybersecurity-certification-framework/.
- Dimov, D.V., Juzenaite, R., ‘Does the GDPR Threaten the Development of Blockchain?’, InfoSec Institute, 21 June 2018. Available at https://resources.infosecinstitute.com/does-the-gdpr-threaten-the-development-of-blockchain/.
- Dimov, D.V., Juzenaite, R., ‘Security vulnerabilities of cryptocurrency exchanges’, InfoSec Institute, 26 June 2018. Available at https://resources.infosecinstitute.com/security-vulnerabilities-of-cryptocurrency-exchanges/.
- Dimov, D.V., Juzenaite, R., ‘BabaYaga and the Rise of Malware-Destroying Malware’, InfoSec Institute, 3 July 2018. Available at https://resources.infosecinstitute.com/babayaga-and-the-rise-of-malware-destroying-malware/.
- Ast, F., Dimov, D.V., ‘Is Kleros a Fair Dispute Resolution System?’, Kleros.io, 18 October 2018. Available at https://blog.kleros.io/is-kleros-a-fair-dispute-resolution-system/.
- Dimov, D.V., ‘5 Common Myths About the GDPR’, Techopedia, 7 June 2019. Available at https://www.techopedia.com/5-common-myths-about-the-gdpr/2/33840.
- Dimov, D.V., Juzenaite, R., ‘Information Security in Conflict Zones’, InfoSec Institute, 29 November 2018. Available at https://resources.infosecinstitute.com/information-security-in-conflict-zones/.
- Dimov, D.V., Juzenaite, R., ‘An Overview of the Proposed DIGIT Act’, InfoSec Institute, 11 February 2019. Available at https://resources.infosecinstitute.com/overview-proposed-digit-act/.
- Dimov, D.V., ‘What do Linux system administrators need to know about the GDPR?’, InfoSec Institute, 11 April 2019. Available at https://resources.infosecinstitute.com/what-do-linux-system-administrators-need-to-know-about-the-gdpr/.
- Dimov, D.V., ‘How to ensure Windows Server is GDPR-compliant’, InfoSec Institute, 14 May 2019. Available at https://resources.infosecinstitute.com/how-to-ensure-windows-server-is-gdpr-compliant/.
- Dimov, D.V., Juzenaite, R., ‘How to identify and eliminate VPN vulnerabilities’, InfoSec Institute, 8 July 2019. Available at https://resources.infosecinstitute.com/how-to-identify-eliminate-vpn-vulnerabilities/.
- Dimov, D.V., Juzenaite, R., ‘An overview of the new security framework for Windows 10’, InfoSec Institute, 9 July 2019. Available at https://resources.infosecinstitute.com/overview-of-new-security-framework-for-windows-10/.
- Dimov, D.V., ‘What does a director of fraud and identity do?’, InfoSec Institute, 9 July 2019. Available at https://resources.infosecinstitute.com/what-does-a-director-of-fraud-and-identity-do-2/.
- Dimov, D.V., Juzenaite, R., ‘Anti-spam legislation for system administrators’, InfoSec Institute, 15 July 2019. Available at https://resources.infosecinstitute.com/anti-spam-legislation-for-system-administrators/.
- Dimov, D.V., ‘5 Can We Expect a U.S. Federal Consumer Privacy Law?’, Techopedia, 17 July 2019. Available at https://www.techopedia.com/can-we-expect-a-us-federal-consumer-privacy-law/2/33888.
- Dimov, D.V., ‘The State of the Art and the Future of GDPR Compliance Software’, Techopedia, 21 August 2019. Available at https://www.techopedia.com/the-state-of-the-art-and-the-future-of-gdpr-compliance-software/2/33942.
- Dimov, D.V., ‘The importance of end-to-end encryption for ensuring GDPR compliance’, FortKnoxster.com, 23 September 2019. Available at https://fortknoxster.com/blog/the-importance-of-end-to-end-encryption-for-ensuring-gdpr-compliance/.
- Dimov, D.V., ‘ The past and future of crowdsourced online dispute resolution (CODR) ’, Internet Policy Review, 7 December 2023. Available at https://policyreview.info/articles/news/past-and-future-crowdsourced-online-dispute-resolution-codr/1734