Typical users are known to use and reuse weak passwords. Yet, as
cyberse...
The collection and use of personal data are becoming more common in toda...
Cybercrime is continuously growing in numbers and becoming more
sophisti...
Many malware campaigns use Microsoft (MS) Office documents as droppers t...
A crucial technical challenge for cybercriminals is to keep control over...
Social networks are evolving to engage their users more by providing the...
The current landscape of the core Internet technologies shows considerab...
The continuous and increasing use of social media has enabled the expres...