Journal: Binding Hook
Loading...
Abbreviation
Publisher
Binding Hook
10 results
Filters
Reset filtersSearch Results
Publications 1 - 10 of 10
- European influence in cyber conflict studies is growingItem type: Other Publication
Binding HookDunn Cavelty, Myriam; Pulver, Tobias; Smeets, Max Willem Eline (2024)The number of cyber conflict articles from European scholars has been rising, shaping the field and policymaking. - Understanding patterns of cyber conflict coverage in mediaItem type: Other Publication
Binding HookMakridis, Christos; Maschmeyer, Lennart; Smeets, Max Willem Eline (2024)A new study on media coverage of cyber incidents uncovers a double bias in reporting that distorts our understanding of the threat. - Necessity, culture, and the shaping of Israel’s cyber capabilitiesItem type: Book Review
Binding HookMaschmeyer, Lennart (2023)ETH Zurich Senior Researcher Lennart Maschmeyer critically examines 'Israel and the Cyber Threat' by Charles D. Freilich, Matthew S. Cohen, and Gabi Siboni. - Drones enhance defences in the Ukraine warItem type: Other Publication
Binding HookGilli, Mauro; Masuhr, Niklas (2024)From 'Poor Man's Air Force' to defensive dominance, Mauro Gilli and Niklas Masuhr track the effect of drones on military tactics. - Predatory Sparrow: cyber sabotage with a conscience?Item type: Other Publication
Binding HookShires, James; Smeets, Max Willem Eline; Weber, Hannah-Sophie (2024)An understudied ‘hacktivist’ group conducts cyberattacks against Iran that clearly violate international norms – but claims to demonstrate ethical restraint. - The story behind the uncovering of the Pegasus spyware scandalItem type: Other Publication
Binding HookBlumfelde, Stella; Bojarski, Kamil; Shires, James; et al. (2024)Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy by Laurent Richard and Sandrine Rigaud depicts the tireless efforts of journalists and researchers that revealed the abuses of Pegasus spyware. - Reading between the lies: using leak sites to analyse ransomware trendsItem type: Other Publication
Binding HookInauen, Janina; Smeets, Max Willem Eline (2024)Leak site data is a tempting source for researchers, but it must be used cautiously. Selection biases, inaccuracy, and manipulation by ransomware groups all pose risks. - Why hostage negotiation tactics don’t work on ransomwareItem type: Other Publication
Binding HookSmeets, Max Willem Eline (2024)Max Smeets unpacks the key differences between ransomware attacks and hostage-taking, explaining why ransomware operators feel no pressure to make concessions while victims grow increasingly desperate. - Provincial governments play an underappreciated role in China’s cyber operationsItem type: Other Publication
Binding HookAgbagala, Joseph Christian (2024)Provincial intelligence branches have specialised skills that enhance China’s cybersecurity and overall posture. - Is ransomware really organised crime?Item type: Other Publication
Binding HookSmeets, Max Willem Eline (2024)Without the need for monopolies, territory, or violence, ransomware groups have more similarities to tech start-ups than the mafia.
Publications 1 - 10 of 10