english

The Ransomware-as-a-Service market within the darknet

For the past few years, ransomware has been one of the fastest-growing cybercrimes. The current trend is that organizations such as businesses, universities, hospitals and even municipalities are becoming the primary targets, whereas regular citizens are, to a lesser extent, being hit. Because of ransomware success, ransomware-as-a-service (RaaS) has grown in popularity.  RaaS is available …

Everyday Cyber Security in Organizations

Everyday cybersecurity involves both technological and human security. Technological security focuses on maintaining the integrity of the technology, ensuring the usability of technological security, and controlling access. Human security encompasses interactions between people mediated through technology. This report is a review of academic and policy literature in the context of everyday cybersecurity in organizations. The …

One-class classification approach for bot detection on Twitter

Twitter bots can be used for malicious purposes, such as distributing malware, disseminate fake news, faking grassroots political movements, and interfering with social movements. Twitter allows its users to access its services through a web page, mobile applications, and an application programming interface (API). Even though API allows enhances users’ experience with contents, API also …

Accounting for the human factors in cyber education

Human users are generally the main target for socially engineered cyber attacks, phishing scams, and data leaks. Thus, several human factors may raise or diminish the likelihood of being the victim of a cyberattack, hack, or data breach. Cyber hygiene involves establishing and maintaining crucial cyber health behaviours. Routinely changing passwords and avoiding recycled passwords, …

Unintended Harms of Cybersecurity Countermeasures

Organizations can deploy cybersecurity countermeasures to prevent or reduce the harms of specific risks. These measures include technical controls, policies, and advice for system users. Although cybersecurity countermeasures are put in place to reduce or prevent damage, they can have unintended consequences. These harms can be negligible such as, causing disruption or serious and thus …

Understanding our memory to increase password memorability

Users acquire more online accounts in their personal and working lives. Therefore, users might indulge in practices such as password reuse, writing down passwords, sharing passwords or choosing weak passwords to be able to remember multiple passwords. These practices might be perceived as more convenient in terms of money, time, and convenience. There are several …

Migration from traditional Social Network to Anonymous Social Network

Even though social network sites (SNS) are still popular, more and more young users are abandoning traditional social network sites. In 2018, less than half of people aged 12–17 used Facebook monthly.  These changes can be attributed to the fact that young users are looking for other options such as Anonymous Social network (ASNS) platforms …