Quantcast
Channel: Daniel Dimov – Infosec Resources
Browsing all 125 articles
Browse latest View live

Domain name parking of gTLDs

Introduction Over the past ten years, there has been a steady increase in the number of generic top-level domain names (gTLD). As a result, people can currently register various gTLDs such as .asia,...

View Article



Differences between the privacy laws in the EU and the US

Introduction Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their worry is not without reason....

View Article

Identity Theft: The Means, Methods and Recourse

Introduction Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity theft may not only suffer financial loses...

View Article

Restricting social media at work

Introduction Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to this, some employers...

View Article

Using Crowdsourcing for Collecting Information about Security Vulnerabilities

Introduction The concept of crowdsourcing was coined by Jeff Howe in 2006. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in the form of an open...

View Article


Mobile Phone Spying Software: Legality, Symptoms, and Removal

Introduction At present, there are many websites offering mobile phone spying software. Typical examples of such websites are SpyBubble (http://www.spybubble.com/), Mobile-Spy...

View Article

Legal Aspects of Online Gambling

1. Introduction Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling Capital, one of the most widely known...

View Article

Software Patent Law: EU, New Zealand, and the US compared

1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the public disclosure of an invention. A...

View Article


E -Money Fraud

1. Introduction Electronic money (e-money) is the digital equivalent of cash that is stored on an electronic device or remotely at a server. It is a relatively new payment instrument that has been...

View Article


PayPal: Chargebacks and Dispute Resolution

Introduction PayPal Inc. is a global provider of online payment services established in 1998 in Palo Alto, California. In 2012, PayPal Inc. generated a total revenue of $5.6 billion USD. . One of its...

View Article

Privacy Implications of Google Glass

Introduction Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eyes of the user. It accepts voice commands that...

View Article

The new Google Maps: a perfect place for review fraud

1. Introduction In 2006, Jeff Howe coined the concept of crowdsourcing. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in the form of an open call....

View Article

Privacy Implications of the Internet of Things

Introduction The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected...

View Article


The Debate Over Network Neutrality in the EU and the USA

1. Introduction Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs) should not control how their customers...

View Article

Ten Important Privacy Threats

1. Introduction As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. A good...

View Article


Human-implanted RFID chips

1. Introduction In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as “bugs.” The device was a predecessor of the Radio-frequency identification...

View Article

Crowdsensing: State of the Art and Privacy Aspects

1. Introduction It is estimated that today approximately three-quarters of the human population has a mobile phone. Crowdsensing, a new business model, allows this large number of mobile phones to be...

View Article


Privacy Risks of Sleep-Tracking Devices

1. Introduction According to the technology market intelligence company “ABI Research”, there are currently more than 10 billion wirelessly connected devices. In 2030, the number of these devices will...

View Article

Information Security of Nanorobots

1. Introduction The year is 2045. A 31-year-old woman is brought to the hospital complainingof headaches and fever. The doctors identify a species of equine encephalitis, a mosquito-borne virus, in her...

View Article

Chinese Social Media Censorship

1. Introduction In the 3rd century BC, the Chinese Emperor Qin Shihuang attempted to destroy original Confucian texts and killed scholars who had knowledge in those texts. This event is known as...

View Article
Browsing all 125 articles
Browse latest View live


Latest Images