english

Cybercrime and shifts in opportunities during COVID-19

The global pandemic in which we have been immersed for months has changed many things. Indeed, no one has been immune to periods of isolation, the risks of contagion from the virus, and unfortunately, the criminal opportunities that arose. Indeed, several waves of attempted fraud have made headlines in recent months. Fraudsters seem likely to …

Privacy calculus on social networks?

Social networks on mobile applications are used more and more by everyone. Businesses and individuals use platforms like Twitter, Facebook, Instagram, WhatsApp, YouTube, and many others as sources of entertainment and income. However, the increase in use and public engagement on those platforms has also caused a significant increase in user privacy risks. Computers and …

Call for Help: Examining the antecedents of Social Support Seeking Among Victims of Cybercrime

The increase in cyber crimes leads to a rise in the number of victims of this type of crime. The number of victims only keeps increasing over time, and the consequences are significant. These crimes, such as fraud, identity theft, hacking, and more, are those rare crimes where victims must go through a long process …

Individual differences influencing vulnerability to victimization and its psychological impacts

The rapidly growing problem of computer crimes affects the vast majority of countries. These crimes that come to life through a computer, phone, or tablet cost businesses and individuals a lot. It is known in the cybersecurity industry that computer attacks are often unintentionally caused by human error, leaving a system unprotected or easily accessible …

Android or iOS? The implication of an exploitation system for victims of domestic and intimate violence

Spyware is an increasingly popular tool sold to provide a surveillance tool to the general population, often advertised as the solution to parents, businesses, or spouses wanting to spy on their children, employee or partners. When this software is installed on the victim’s phone, it acts as a third party between the victim’s phone and …

What factors can influence risky behavior in cybersecurity?

Many cybersecurity problems require cyber teams to educate themselves and adapt to new issues constantly. Even though cybersecurity teams and experts polish and hone their knowledge using state-of-the-art software, some factors remain beyond their control. Human behaviours have direct and significant impacts on a computer attack’s success or failure. Individuals’ attitudes and behaviours strongly influence …

Developing a culture of cybersecurity within your organization

Nowadays, businesses are regularly using technology to safeguard their documents and their employee’s and customers’ personal information. Even if organizations are installing protection software or have cybersecurity departments on-site, their employees’ actions are a major significant weakness. A recent report showed that a significant proportion of companies’ cybersecurity breaches are committed by employees who do …

Do active and passive risks have the same predictive power as cybersecurity behaviour?

The growing number of cybercrime and their impact on victims and companies’ lives are considerable. In some cases, cybercrimes are usually the result of a wrong decision made by the user. Schneier (2000) even describes users as the weakest link in the cybersecurity chain. Although the general population seems to be aware of risks while …