LATEST NEWS
Police around the world learn to fight global-scale cybercrime
Police must join forces across international borders to take on modern cybercriminals.…
There’s a gap between what people expect when they report cybercrime, and…
When victims report a cybercrime they expect someone brought to justice, but that’s not always possible.…
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising…
Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major…
Social media crime: Clusters for a structural analysis
Ever since their coming into existence, social media have been impacting our communication behaviour and added new…
Cyber-warfare – How the battlefield went digital
Spies and intelligence agents, wiretaps and classified documents; thanks to our extensive training through…
Cyberbullying: An aid and prevention plan
School life is not always easy and all harmonious, in fact harassment and bullying pose a continuous problem.…
General matters of the Horizon 2020 programme
Aside from more specific projects and calls, the European Commission’s Horizon 2020 Work Programme also deals with…
Management of cyber-attacks and other risks in the context of Horizon 2020
Whether it’s private citizens, small and medium-sized companies, or the public power grid, we are dependent on…
The World Wide Web has irreversibly changed the way how organised crime works. Law…
Over the last decades organised crime has changed its modi operandi. Globalisation enabled wide-spread networks and…
Technological challenges for managing border security
When it comes to border security, conventional means seem to be unable to counter modern challenges on a large…
Cybersecurity, Digital Privacy and data protection
As computers gain hold of nearly every facet of our lives, our reliance on them grows. Even now, the water supply,…
Network traffic analysis
Network traffic analysis is the method of identifying, analysing and recording network activity. This can encompass…