Cryptojacking and ransomware: Cyberthreat scenarios for 2019

Banks and other organizations within the finance industry are bound to encounter new data security threats throughout 2019. From nation state-directed strikes to ...
READ MORE

Modus Operandi and Cyberprofiling

Criminal profiling is a psychology-based technique in which, on the basis of an analysis of the behavior engaged in by offenders at the time of their crime, an attempt ...
READ MORE

Hyperparameter optimization

In Machine Learning, many parameters are assessed and improved via the learning process. By contrast, a hyperparameter is a variable whose value is set before training; ...
READ MORE

Insider profiles II. Features

As a follow-up to the previous post, where we described the existing typologies of insiders, we are now going to delve deeper into a more psychological profiling of ...
READ MORE

Insider profiles I. Typologies

Lately, enterprises have had to face a very specific type of risk that is increasingly harmful and dangerous for their survival and consists of the problems that can ...
READ MORE

Opportunity makes the cybercriminal

Just imagine that you are strolling down the street near a mailbox and a few feet away you see what appears to be a letter lying on the ground.
READ MORE

The Hackers Double “R”: Rationality and Risk

In the beginning, the term hacker had a positive connotation in the computing sector and among programming experts. “Hackers” were considered to be especially skillful ...
READ MORE

Cyberfraud and emotional detachment

A group of golfers were asked whether they would feel capable of moving the ball with their hand to place it in a more favorable position. A high percentage of these ...
READ MORE

Teens and Cyberdelinquency. The Impact of Low Online Self-Control.

Today’s teens form part of Gen Z, young people who were born and raised in the new technology era, who cannot envisage an offline world with no access to the Internet or ...
READ MORE

The "Flow state": Hacking for hacking’s sake

Paul Graham, one of the foremost experts and educators on the hacker phenomenon, talks about how two of top hackers’ main traits are their curiosity and their capacity ...
READ MORE