Skip to main content

About

Welcome to our blog dedicated to exploring the complex and ever-changing world of cybersecurity. With the increasing reliance on technology in our daily lives and the growing sophistication of cyber threats, it's more important than ever to stay informed about the latest trends and best practices in cybersecurity.

Despite the widespread adoption of technology, many people still have a high level of trust in the devices and systems they use, assuming that they are secure by default. However, the reality is that there are many vulnerabilities that can be exploited by cybercriminals, putting individuals and organizations at risk of cyber attacks, data breaches, and other harmful incidents.

Through our blog, we aim to provide a comprehensive resource for anyone looking to enhance their understanding of cybersecurity. We will cover a range of topics, including the latest threats and trends in cybercrime, best practices for securing devices and networks, and strategies for protecting sensitive information.

Our goal is to empower individuals and organizations to take proactive steps to protect themselves from cyber threats and to promote a culture of cybersecurity awareness and education. We believe that by working together and staying informed, we can create a safer and more secure digital world for everyone. 

Comments

Popular posts from this blog

A double-edged sword: the potential benefits and risks associated with the use of online platforms in fighting crime. Written by: Dille Wienese

  "Technology is a tool that can allow us to create a better future, but it is not a silver bullet." -        Tim Cook, CEO of Apple Inc.   On the 18 th of March 2019, the Netherlands was shaken by a devastating attack that occurred on a tram in Utrecht. The incident resulted in the loss of four lives and left several others injured or traumatized. The perpetrator, Gökmen T., was apprehended on the same day after a manhunt and has been sentenced to life in prison (Korvinus, 2021). Following the attack, the danger level was raised to an unprecedented level of 5, which is the highest level possible. Meanwhile, group chats of my family and friends started circulating pictures of possible suspects, hints, and motives of the shooter. Although I did not think much of it then, I now realize that such speculation can have dire consequences for innocent individuals suspected of a crime. Afterward, an innocent man who was detained in connection with the Ut...

The struggle of combating child pornography through public policing. Written by: Amandine Ducros

  The rise of child pornography in the modern era     The new growth of information technology has introduced a new form of criminality to the criminal justice system : cyber crime (Marcum, Higgins, Freiburger & Ricketts, 2010). Cyberspace has no physical geography, no territorial boundaries exist (Wells, 2000). Cyber child porn, like cyber crime, is difficult to control because by its very nature its disrespects national boundaries ( Schell, Martin, Hung, & Rueda , 2 007 ), making the task of the police force even more complicated. Indeed, information communication technology facilitates abuse and exploitation of children online, especially child pornography (Jalil, 2015). Child pornography can be defined as the sexually explicit pictures or films involving younger people under the age of 18  (Marcum, Higgins, Freiburger & Ricketts, 2010) and is available on the Internet in many different formats : pictures, videos, sound files, stories (Burk, Sowerbut...

Policing Revenge Porn: Social, Practical and Legal Boundaries. Written by: Lotus Poel

The rise of revenge porn The website  IsAnyoneUp  was created in 2010, and is often seen as the original revenge porn website. The creator of the website – Hunter Moore – allowed any member of the public to submit sexually explicit pictures to be posted on the website, often along with the pictured individual’s personal information, gaining over 500 million views and thousands of dollars in ad revenue   (Poole, 2015; Levendowski, 2014) . In 2014, Moore was indicted for identity theft and conspiracy to hack into personal e-mail accounts for the purpose of acquiring the explicit pictures, and in 2015  IsAnyoneUp  and other similar websites were removed from the internet. The lack of adequate legislation at the time made the journey to indict Moore tougher than it should have been. Luckily, since 2013, revenge porn has been criminalised in many countries. Legislation is still developing in an attempt to keep up with the rapid developments and anonymity offenders ar...