Skip to content
Logo

Cyber Crime Research Share

CONTACT
CONTACT
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR

CCRS Byte

Blog

Starting from our Vision, CCRS Byte is conceptualized as a forum for research and exchange of knowledge about IT (mis)use and protection against attacks in cyberspace

This page is dedicated to enthusiasts who are interested in CCRS Topics and who are willing to share a story, opinion or research result with the general, professional and scientific public

You care to share your own author's text?

Click here

Disclaimer:

The views and opinions expressed in texts are those of the authors and do not necessarily reflect the views or opinions of any entities they represent nor do they represent the position of CCRS

Categories:

  • Digital Forensics
  • Digital Investigation
  • Digital Privacy
  • Digital Evidence
  • Digital Surveillance
  • Cyber Security
  • Cybercrime
  • Serbia

MOST RECENT

No posts found.

PREVIOUS

Cyber Security

Pentesting Simulation for OSCP practice

Cyber Security
An adrenaline-pumping tale that unveils the enigmatic world of penetration testing
Read More
Digital Privacy,Digital Surveillance

Deepfakes, artificial intelligence and protests: When is the truth under the question?

Digital Privacy,Digital Surveillance
Use of deepfake technology to discredit protest organizers or participants
Read More
Cyber Security,Cybercrime

The necessity of a new cyberlaw for Dutch intelligence and security services

Cyber Security,Cybercrime
The Dutch Temporary Cyber Act: Necessary measure or disproportionate expansion of power?
Read More
Digital Investigation

Inside the Criminal’s Mind: Using Virtual Reality to Understand Criminal Decision-Making

Digital Investigation
Crime, by definition, is a hidden behavior. This makes it hard for researchers to study and reduce crime. An international collaboration of researchers uses Virtual Reality to go inside the criminal mind to understand when a crime might occur and why
Read More
Cybercrime,Serbia

Child Pornography in Serbia

Cybercrime,Serbia
There are still many unpunished for the crime of child pornography
Read More
Cyber Security

CERT's response to a cyber incident is a rapid and coordinated response

Cyber Security
As the first line of defense against cyber threats, providing expertise in incident response, prevention and training, CERT is of critical importance for the cyber security of any organization or country
Read More
Digital Forensics,Serbia

LEA's tools for mobile phone forensics in Serbia

Digital Forensics,Serbia
What could digital forensics tools reveal about you from your phone?
Read More
Digital Forensics,Digital Investigation

The importance of education in digital forensics

Digital Forensics,Digital Investigation
Handling digital evidence without proper education and training in the field of digital forensics can lead to serious consequences, in terms of the legal admissibility of evidence and the accuracy of findings
Read More
Cybercrime

Sanctioning Hate Speech on the Internet: in Search of the Best Approach

Cybercrime
Challenges in the struggle against hate speech online and possible mechanisms for combating this phenomenon
Read More
Cybercrime

What is the NSO group and how did they destroy people’s lives?

Cybercrime
In the dark, shadowy realm where technology and espionage converge, one name stands out like a harbinger of clandestine power: NSO Group
Read More
Digital Investigation

Artificial Intelligence and Law

Digital Investigation
Review of task automation techniques and tools
Read More
Digital Privacy,Cyber Security

Dial These Numbers to See if Your Phone Is Tapped or Hacked

Digital Privacy,Cyber Security
12 Numbers To Dial
Read More
Digital Privacy,Cyber Security

Averting Armageddon: The AI Crisis and the Chance to Save the World

Digital Privacy,Cyber Security
The future and responsible governance of AI cannot be a discarded subplot of innovation; it must be a bestseller we all strive to write
Read More
Cyber Security

How to detect WiFi deauthentication attacks and is there anything we can do to prevent them?

Cyber Security
Setting up a WiFi penetration testing lab
Read More
Digital Privacy,Serbia

Institutions as a cause of privacy violations by media

Digital Privacy,Serbia
A mistake by state authorities does not imply "permission" to violate the ethical principles of the profession
Read More
Digital Privacy,Digital Surveillance,Serbia

Video surveillance and biometric data processing in Serbia?

Digital Privacy,Digital Surveillance,Serbia
Research on equipment procurement
Read More
Digital Forensics,Digital Evidence,Cyber Security

Cloud Forensics investigations in Azure

Digital Forensics,Digital Evidence,Cyber Security
How to apply the principles and methods of digital forensics within the cloud environment to investigate a security incident?
Read More
Digital Forensics,Digital Investigation,Digital Evidence,Cybercrime

A Global Convention on Cybercrime?

Digital Forensics,Digital Investigation,Digital Evidence,Cybercrime
Processes in the UN
Read More
Cyber Security

DNS Security Today as a First Line of Defense against Hackers

Cyber Security
Set it up!
Read More
Cyber Security,Cybercrime

Responsibility behind the mask of trolls

Cyber Security,Cybercrime
Trolling and the formation of negative values and behavior
Read More
  • 1
  • 2
  • 3
  • 4

CyberCrime.Research.Share
  • CCRS
  • About
  • Topics
  • Up2Date
  • CCRS Bit
  • CCRS Byte
  • SERBIA
  • SR

Privacy Policy

Be informed

CCRS Bit

CCRS Byte

 

Keep-in-touch

contact@cybercrime.rs

Stay tuned

Follow CCRS

Copyright ©

Made by CCRS with ♥

⚠️  Disclaimer:

Provided for educational and informative purposes only