The five most visible violations include identity fraud, cyberbullying, illegal streaming, torrenting, and the unlawful recording of calls. These are severe in nature as they cause harm to individuals or society as a whole. Identity fraud can destroy the finances… Continue Reading →
The article discusses how bug bounty policies incentivize cybersecurity by rewarding ethical hackers who find vulnerabilities. Ethical hackers were often at one point illegal hackers that were caught and converted after they experienced lawful consequences. The literature review highlights the… Continue Reading →
The Glasswasherparts.com data breach letter puts forward certain economic concepts such as the theory of external costs where firms transfer a cost to their customers after their product has caused a problem which the consumer did not cause in the… Continue Reading →
The cybersecurity analyst role isn’t just about tech skills it’s also connected to social dynamics and human behaviors. The job at its core, involves protecting people and organizations from online threats defending against the darker sides of humanity like cybercrime,… Continue Reading →
I read an article on social cybersecurity and it was a bit of a wake-up call. The article dives into how the internet has completely erased the need for physical presence in influence operations, making open societies way more vulnerable… Continue Reading →
The video explains how cybercriminals can exploit information people post on social media. When we share details like our location, daily routines, or even personal interests, we may unknowingly give cybercriminals clues they can use. For example, they could guess… Continue Reading →
Like everything else in life, movies and TV shows totally warp our ideas about hackers. They always make it look like hacking takes a few clicks and suddenly you’re inside a government database. The reality is very different as hacking… Continue Reading →
Matthew Stone ODU 2024 fallThis is my ranking of the motives for cybercrime based on the linked articles:1. For Money: Financial gain is the most straightforward and universally understoodmotive, making it highly logical.2. Revenge: This motive resonates due to emotional… Continue Reading →
As a young college student that grew up during a time before smartphones where fullymainstream, I see how technology ties into each level of Maslow’s Hierarchy. For physiologicalneeds, my phone and laptop are essential for things like food ordering apps… Continue Reading →
© 2026 Matthew Stone — Powered by WordPress
Original theme by Anders Noren | Adapted by ITS — Up ↑