Skip to main content
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into... more
    • by 
    •   10  
      CybersecurityDigital ForensicsAll areas of Informatics, Educational technologies, Cyber Security & Forensics, Cyber Audit, ICTCyber Security
— This seminar covers a contemporary issue in Computer Security; Spyware and Trojan Horses. These are separate security threats to networked systems, both of which are realized using differing software development techniques. We introduce... more
    • by 
    •   3  
      SPYWAREHorsesTrojan Horse
    • by 
    •   2  
      SPYWARECasusluk
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most... more
    • by 
    •   6  
      PsychologyMalware AnalysisOPERATING SYSTEMSocial Engineering
The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model... more
    • by 
    •   2  
      SPYWAREPrivacy Concern
models
    • by 
    • SPYWARE
Ein ausführlicher Leitfaden für Anfänger zum Hacken von Facebook Passwort
    • by 
    •   2  
      SpionageSPYWARE
Masalah keamanan system penyedia informasi menjadi salah satu aspek penting dari sebuah sistem informasi. Sayang sekali masalah keamanan ini sering kali kurang mendapat perhatian dari para pemilik dan pengelola sistem informasi.... more
    • by 
    •   3  
      Network SecuritySPYWAREBackdoor
"Lorsque l’on évoque l’affaire « Pegasus », beaucoup l’associent immédiatement à la surveillance globale par les États de nos faits et gestes, aux actions d’espionnage adverse, mais également au non-respect de la législation en vigueur... more
    • by 
    •   13  
      GeopoliticsEuropean UnionCyber crimeGeopolitcs and Geostrategy
A product of the global rise of right-wing populism has been a seeming normalisation of gendered public disinformation, which portrays female public figures as unintelligent, untrustworthy, irrational, and libidinous. Social media has... more
    • by 
    •   20  
      CommunicationMedia StudiesCensorshipJournalism
User activity monitoring (UAM) do the task of monitoring and recording of user actions, in the field of information security or cyber security. Including the use of applications, windows opened, system commands executed, checkboxes... more
    • by 
    •   3  
      Computer ScienceSPYWAREUam
Internet surveillance has become a crucial issue for journalism. The “Snowden moment” has shed light on the risks that journalists and their sources face while communicating online and has shown how journalists themselves can be targets... more
    • by 
    •   13  
      JournalismInformation SecurityDigital JournalismSurveillance Studies
International journal on applications of graph theory in wireless ad hoc networks and sensor networks (ABSTRACT T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other... more
    • by 
    •   10  
      PsychologyCognitive PsychologyDevelopmental PsychologyMalware Analysis
Technologies play crucial roles in security politics. In a recent push to understand the dynamic interplay between technologies and politics, IR scholars increasingly draw on reflexive research traditions. The aim is to understand the... more
    • by 
    •   14  
      Artificial IntelligenceSecurity StudiesCritical Security StudiesCausation
Pitch => "Stylish, une extension de navigateur web, vient d'être supprimée de Mozilla et de Google Chrome. Téléchargée par plus de deux millions d'internautes, elle collectait leur historique de navigation."
    • by 
    •   14  
      Data MiningData AnalysisBig BrotherDatabases
Après le scandale de la surveillance des communications par la NSA, il semblerait que la Russie ferait de même. Les services de renseignements, le FSB, espionnerait plus de 400 millions d'internautes grâce à un fournisseur d'antivirus.
    • by 
    •   8  
      Democracy and Cyber-Democracy Theory and PracticeCyber WarfareIntelligence and EspionageCyberspace
This article is about how you can protect yourself and your computer from Cerbe virus.
    • by 
    •   8  
      Computer VirusComputer MalwareVirusSPYWARE
The paper summarizes the research the author conducted under the individually targetable mass surveillance systems of the P. R. China dictatorial regime with cyber sovereignty claims. In the complexities of cyber security and mass... more
    • by 
    •   16  
      InformaticsHuman RightsInternational Criminal LawDictatorships
L’evoluzione delle tecnologie, con la relativa diffusione delle piattaforme digitali, ha certamente apportato molteplici benefici alla nostra società e potremmo definirla come la terza rivoluzione industriale, quella digitale appunto. Non... more
    • by 
    •   6  
      IntelligencePrivacySocial MediaCyber Security
    • by 
    •   2  
      Malware AnalysisSPYWARE
    • by 
    •   16  
      Computer ScienceInformation TechnologyEducationInformation Security
“Warning, your computer is infected with spyware. Windows needs to download and install the anti-spyware updates to remedy this issue. Click OK to begin.” This is just one example of many popup warnings that spyware and malware creators... more
    • by 
    •   9  
      Human Computer InteractionInternet StudiesWarningsThe Internet
The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen data. This... more
    • by 
    •   8  
      TrustNetwork SecurityInternet SecurityConfidence
—Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can... more
    • by 
    •   17  
      Information SecuritySocial NetworkingSecuritySocial Media
جاسوس افزار و آگهی افزار فصل اول: مقدمه فصل دوم: رسیدن (نصب - راه اندازی) فصل سوم: ماندگاری در محل (گریز از کشف - اجتناب از حذف) فصل چهارم: کلیدنگاری (کلیدنگاری در فضای کاربری - روشهای مقابله با کلید نگاری - تایید هویت) فصل پنجم:... more
    • by  and +1
    •   5  
      Malware AnalysisMalwareMalware DetectionSPYWARE
Has someone been sending spam or viruses over eMail with your identity? With identity theft scams of any type, once the forger has your information it's very difficult to do much until they're either caught [by authorities], or their... more
    • by 
    •   20  
      CyberlawCybercrimesInternet SecuritySPAM
The policy study re-surfaces the question of communications interception in Macedonia through looking into the most pressing issues affecting how this special investigative measure is implemented and focusing primarily on its... more
    • by  and +1
    •   14  
      IntelligenceEuropeanization of the BalkansSecurity sector ReformBalkans
El domingo 18 de julio, Amnistía Internacional y la plataforma Forbidden Stories, con la colaboración de varios medios informativos, dieron a conocer que algunos de los clientes del programa Pegasus emplearon ese spyware para interceptar... more
    • by 
    •   5  
      PeriodismoSPYWAREVigilanciaEspionaje
Human actions like selecting incorrect password, entering the password in an insecure way it will leads to weakest link in authentication. Due to the weakest link, an attacker can damage the hardware, software or theft the information. So... more
    • by 
    •   3  
      AuthenticationSPYWAREShoulder surfing attack
    • by 
    •   16  
      CybercrimesHuman RightsPrivacySurveillance Studies
GRAPH-HOC is a quarterly open access peer-reviewed journal focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor... more
    • by 
    •   19  
      PsychologyInformation SecurityMobile Ad Hoc NetworksGraph Theory
Zwischen Tier und Mensch haben sich im Laufe der Zeit viele ungewtihnliche Symbiosen und Antibiosen ergeben. Vom Nutztier zur Leibspeise, vom besten Freund zum gefUrchteten Feind. Der amerikanische Geheimdienst CIA begann ein Projekt mit... more
    • by 
    •   3  
      CatsSpying and IntelligenceSPYWARE
It's now indisputable fact that governments in the Middle East are using spyware to spot political activists rather than terrorists or criminals. I wrote many articles about this phenomenon since the revelation of WikiLeaks SpyFiles. But... more
    • by 
    •   5  
      Human RightsSurveillance StudiesMiddle EastCyber Security
Identity theft is an attractive activity for cyber-criminals. Every day, many people are victim of one of the many cyber-traps resulting in millions of dollars lost. People victim of these crimes suffer terrible consequences trying to... more
    • by 
    •   9  
      Computer SecurityInformation AssuranceLaw EnforcementFinancial Institutions
The primary goal of computer security is to defend computers against attacks launched by malicious users. There are a number of ways in which researchers and developers can work to protect the network they use; one class of these tools... more
    • by 
    •   5  
      SPYWAREIntrusion Detection SystemZero day attack detectionAvalanche effect
Spyware evidence is playing a decisive role in court cases. Recently, Delhi high court has admitted evidence collected through spyware illegally installed by the husband in his wife mobile. Gone are the days when you have to steal the... more
    • by 
    •   6  
      PrivacyWomen's RightsCyber crimeSPYWARE
Let us ask a counter-intuitive question: what if instead of (only) hacking the internet sites of Mastercard, Paypal and Visa, our ‘Anonymous’ hackers had (instead) attempted to connect with the rank and file employees of the company to go... more
    • by 
    •   8  
      Surveillance StudiesEmpireAnonymousU.S. Foreign Policy
It is possible to transfer gigabits of data with near perfect secrecy using the BitTorrent Protocols and BitTorrent Objects providing one concatenates them together in a way to provide essentially concatenated encryption (as single step... more
    • by 
    •   13  
      Information SecurityNetwork SecurityInternational SecurityRotordynamics
Abstract—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are vulnerable to spyware attacks. We propose a new... more
    • by 
    •   4  
      AuthenticationGraphical PasswordSPYWARECAPTCHA