Cybersecurity

Online Anonymity: Good or Bad?

Anonymity on the Internet provides an important layer of protection for people to express themselves online, while keeping their...

Apr 5 · 1 min read >
Online Anonymity

Financial Sector Cybersecurity Regulations

(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are...

Apr 1 · 3 min read >
Cybersecurity Regulations

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government...

Mar 31 · 9 min read >

Mobile Cybersecurity Policies in the Private and Public Sector

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved...

Mar 26 · 10 min read >

Hacking as an Addiction

Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain,...

Mar 23 · 1 min read >
Hacking as an Addiction

Motivation and Intent of Hackers

Just over a decade ago I began learning about web technologies and found myself learning basic HTML.  I was...

Mar 21 · 1 min read >
Motivation and Intent of Hackers

Ethical vs Non-Ethical Hackers

In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification...

Mar 20 · 2 min read >
Ethical vs Non-Ethical Hackers

Will the Mandiant Report Raise Public Awareness?

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the...

Mar 8 · 1 min read >
Mandiant Report

Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article...

Mar 7 · 1 min read >
Mobile Security