The rapid increase and advancements in technology have brought faster internet speeds, cloud-storage based architectures, easy access to data and information, and marketization of digital …
Cyber-Trespass
Holt & Bossler (2015) summarize Wall’s categories of cybercrime typology which address four areas, out of these I personally believe that the one which deserves the most attention is Cyber-Trespass. Trespass in itself encompasses certain elements such as intentionally entering …
Social Security Board to Implement Biometric Technology
Recently, the Social Security Board (SSB) has made plans to move forward with integrating biometric technology in its system in order to expedite the registration process. For those who are unfamiliar with the term, biometric technology refers to a system that identifies and verifies a person’s identity through unique aspects of their biology…
The Dark Web As a Data Source
Observational research is defined as research focusing on the observation of behavior in an unobtrusive manner (Bryant, n.d). In essence, it allows researchers to experience a specific …
The Rise and Rise of Cryptojacking: What You Need to Know
You’ve probably heard of cryptojacking by now, otherwise known as illicit cryptocurrency mining. But oftentimes, we think that cybercrime affects large companies or that hackers only target important or affluent people. But here’s the thing …