Security of Smart Contracts
In today’s globalized world, it is not an unusual occurrence a contract to be concluded by parties located in nine different countries. The resolution of disputes arising out of such international contracts requires significant financial resources, e.g., fees for translating documents in many different languages, court costs, and attorneys’ fees. Extensive investments in dispute resolution...
Privacy concerns about Pokémon GO
Pokémon Go, an augmented reality smartphone game which has recently become a sensation, is created and operated by the software development giant Niantic, Inc. The term “augmented reality” can be defined in simple words as a live view which is supplemented by computer-generated input. Within the first week of its release, Pokémon Go was downloaded about 7.5 million times in the United States...
Hacking Facebook Accounts
Facebook is used by nearly a sixth of the world’s population. This large number of Facebook users are vulnerable to information security attacks.
Hacking social media accounts does not require sophisticated skills. By way of illustration, a simple Google search reveals numerous instructions on how to gain unauthorized access to a Facebook account. Hacked Facebook profiles, in combination with...
Ransomware Attacks on Law Firms
Since 2015, information security specialists have been stressing that the number of ransomware attacks against law firms has increased significantly. Firms providing legal services are attractive targets for ransomware attacks because many of them are ready to pay to cyber criminals to avoid the negative reputational consequences which arise from the failure to protect their clients’...
New Wave of Cyber-attacks on Banks
© CC0 Public Domain
In the past two years, the financial world has been stunned by three major cyber-attacks on banks which were committed by (1) utilising the digital infrastructure of the targeted banks and (2) exploiting weaknesses in the systems that connect banks to the global SWIFT network. Our new article discusses the modus operandi of (1) the attack on Ecuadorian Banco del...
Information Security Vulnerabilities of Trains
We published an article entitled “Information Security Vulnerabilities of Trains”. In order to gain access to the article, please click here.
Tax-evasion hacks
We published an article entitled: “Tax-Evasion Hacks”. In order to gain access to the article, please click here.
Security Vulnerabilities of Internet-Connected Homes
We published an article entitled “Security Vulnerabilities of Internet-Connected Homes”. In order to gain access to the article, please click here.
Phishing Attacks Using Public Data
Daniel Dimov published an article entitled “Phishing Attacks Using Public Data”. In order to gain access to the article, please click here.
U.S. government white paper
A reference to an article published by Daniel Dimov was included in a U.S. government white paper. If you would like to see the reference, please go to http://www.its.dot.gov/itspac/Dec2014/Smart_Connected_City_FINAL_111314.pdf and look at page 44.