Understanding the Use of Artificial Intelligence in Cybercrime
Studies on the use of deep fake technology for cyber victimization in the metaverse and the use of GPT-4 to simulate targeted social engineering vulnerabilities
Studies on the use of deep fake technology for cyber victimization in the metaverse and the use of GPT-4 to simulate targeted social engineering vulnerabilities
How do internet "stores" in Serbia offer tempting equipment for monitoring mobile devices and computers?
Istraživanje otkriva mrežu uticaja u moćnoj koaliciji koja stoji iza predloga Evropske komisije da se skenira celokupna elektronska komunikacija radi detekcije materijala koji sadrži prikaz seksualnog zlostavljanja dece – predloga za koji vodeći stručnjaci kažu da ugrožava ljudska prava i da će, potkopavanjem enkripcije, dovesti do stvaranja novih ranjivosti
18 years after adopting Law on Organization and Jurisdiction of State Authorities for the Fight against Cybercrime
The 6th Session of the Ad Hoc Committee on Cybercrime finished its work, and one final round of inter-state negotiations is left. Is there a treaty text yet, and are states close to a final agreement?
Staying informed about these trends is essential for individuals and businesses to safeguard their sensitive information and financial well-being
The Dutch Temporary Cyber Act: Necessary measure or disproportionate expansion of power?