Skip to main content
In philosophy, there is an as yet unresolved discussion on whether there are different kinds of kinds and what those kinds are. In particular, there is a distinction between indifferent kinds, which are unaffected by observation and... more
Paper on evolution of Iran's cyber warfare capabilities, institutions; key attacks on the United States and allies; security implications for the US.

Written for Dynamics of Cyber Conflict course at Columbia SIPA
Seminário ao Mestrado em Segurança da Informação e Comunicação, da VSB - Universidade Técnica de Ostrava, República Checa, 30 de abril de 2019.
Prezentowany tekst jest zapisem wykładu, jaki wygłosił autor w trakcie uroczystości nadania mu godności doktora honoris causa Uniwersytetu Ekonomicznego w Krakowie (26.05.2008). W wykładzie najpierw zdefiniowano zagrożenia, jakie mogą... more
This paper explores which rules and values are relevant to contemporary practices of hacking and making. It examines how members in hacker-and makerspaces conceptualise their communities and their use of digital technology. Based on... more
Researchers and policymakers are moving towards a model defined as people-powered health — where care is discussed as transforming from a top-down service to a network of coordinated actors. At the same time, for large numbers of people,... more
This paper builds off the Our Data Ourselves research project, which examined ways of understanding and reclaiming the data that young people produce on smartphone devices. Here we explore the growing usage and centrality of mobiles in... more
Article on the history of cyberwarfare in Russia (1980 - late 1990s)
This paper (in French) presents the method to know if your gmail mailbox is hacked and provides a list of countermeasures.
A short essay prepared in light of Social & Professional Issues of the Information Age, questioning the ethicalities of cyber warfare, compared to traditional warfare.
I have objectives from my good work done, i hack and spam which is the sole reason i can guarantee remmiting valid Cc's,valid spamming tools, running multiple transfers. As you all knows i work from anonymous off shore server, I have... more
The requirement for a collaborative effort to achieve a common set of security standards for use by entities that process, store or transport voter data. -More than 350,000 voting machines are used in the Unites States today in over 42... more
Aujourd'hui nous avons publié notre nouvel outil de piratage pour vous. Amazon Cartes Cadeau Generateur est la meilleure astuce fait jusqu'à présent par notre équipe. Ce est aussi le plus utile pour tout le monde. NouveauxAstuces a publié... more
Assassins Creed Unity Generateur Key vous donnera le pouvoir de générer une clé légitime pour Assassins Creed Unity. Avec notre outil, vous aurez une clé dans seulement quelques instants, avec seulement quelques clics.
Exploit kits are becoming frequently used to generate attacks against systems and software components. These exploit kits are really popular among the non-expert community (script kiddies) and are publicly available on Social Medias. In... more
Jual Madu Asli Gresik,Jual Madu Murni Baciro Gondokusuman,Jual Madu Murni Di Garut,Jual Madu Asli Di Garut,Jual Madu Asli Daerah Garut,Harga Madu Asli Flores,Jual Madu Murni Di Bandung,Jual Madu Murni Di Surabaya,Jual Madu Murni Di... more
This article analyses the current Gulf crisis that started in May 2017 by posing the following question. Did an information war unfold or did the crisis events that took place merely illustrate yet another round of propaganda and... more
EL PRESENTE ARTÍCULO SE CENTRA EN EL DELITO DE ACCESO ABUSIVO ESTABLECIDO EN EL ARTÍCULO 615-TER DEL CÓDIGO PENAL ITALIANO. EN PRIMER LUGAR, ANALIZA LOS ACTOS DE ACCESO Y PERMANENCIA EN UN SISTEMA INFORMÁTICO. EN SEGUNDO LUGAR, DETERMINA... more
Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cyber security experts use the term “social engineering” to highlight the “human factor" in... more
Téléchargez, installez et utilisez notre Dragon Mania Legends Astuce! Si vous voulez ajouter des quantités illimitées d'or, de gemmes et de nourriture à votre jeu il suffit d'entrer la quantité que vous souhaitez et cliquez sur le bouton... more
Resumo: Num Estado de Direito, a luta política entre os vários grupos, que defendem ou atacam interesses de classe, económicos, profissionais, geracionais, de género, ou outros, embora regulada, é uma constante. Governos, empresas e... more
In this paper, we describe the techniques, methods and context for hacking humans using publicly available information found on the Internet.
The Cyber Community has published numerous Zero Trust Architecture (ZTA) infographics, white papers, and possible solution papers. INFOSECFORCE certainly applauds all these efforts. The possible difference between many of these... more
Aaron Swartz has been one of the pivotal characters in the recent history of the Internet. As an American activist, programmer, hacker, and open access advocate, Swartz was involved in the launch of now established Web standards and... more
Through this presentation you will learn how hackers manipulate networks and system and how we can diffuse their efforts.
This Article addresses a fluid and increasingly salient category of cases involving the First Amendment right to publish information that was hacked, stolen, or illegally leaked by someone else. Twenty years ago, in Bartnicki v. Vopper,... more
Meta-analysis of Facebook as a surveillance tool, a study that helps us to understand various researchers perspective about social media surveillance, focusing on Facebook mainly. Understanding the importance of privacy and how... more
Nigeria has begun to experience one of its difficult times when cybercrimes started to escalate day by day and causing loss of billions of dollars since then. The need to address this issue has become paramount before more damage is done.... more
Fashion hacking is a practice where fashion is reverse engineered and tuned to make users "fashion-­able", using social media to expand transversal tactics in order to reprogram and shapeshift fashion codes. Other traits address the... more
Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness.... more
La figura del hacker ha sido protagonista de múltiples relatos, los cuales coinciden con el imaginario colectivo cultivado por los medios de comunicación: piratas informáticos, que se entrometen en cuentas privadas, en sistemas bancarios... more
Hacking is a set of practices with code that provides the state an opportunity to defend and expand itself onto the internet. Bringing together science and technology studies and sociology scholarship on boundary objects and boundary... more