877.791.9571 |

About the Author:

Daniel Dimov is an independent legal consultant (www.dimov.pro) based in Belgium. Daniel Dimov is a PhD student at the Center for Law in the Information Society at Leiden University, the Netherlands. He did traineeships with the European Commission (Brussels), European Digital Rights (Brussels), and T.M.C. Asser Institute (the Hague). He has a Master's Degree in Bulgarian Law (Bulgaria), a Master's Degree in European law (The Netherlands), and a certificate in Public International Law from the Hague Academy of International law. Daniel is a legal consultant with InfoSec Institute.

Information Security Vulnerabilities of Automobiles

1. Introduction

In the past, cars and computers did not have many touching points. Nowadays, modern cars contain numerous computers. As Bruce Emaus, the chairman of SAE International, stated: “It […]


Legality of Jailbreaking Mobile Phones

1. Introduction

The term “jailbreaking” refers to circumventing security measures of a mobile operating system with the aim to install unauthorized software. The term originates from the very first hacks […]


Privacy Risks of Beacons

1. Introduction

On October 6th 2014, buzzfeed.com published a report stating that Titan, a company controlling a number of New York City’s phone booth advertising displays, installed tiny wireless devices […]


Cyber Attack Protection via Crowdsourcing

1. Introduction

In 2013, Imperva, a company providing information security products and services, published a study analyzing attack traffic against 60 web applications within the time period of January-March 2013. […]


Chinese Social Media Censorship

1. Introduction

In the 3rd century BC, the Chinese Emperor Qin Shihuang attempted to destroy original Confucian texts and killed scholars who had knowledge in those texts. This event is […]


Information Security of Nanorobots

1. Introduction

The year is 2045. A 31-year-old woman is brought to the hospital complainingof headaches and fever. The doctors identify a species of equine encephalitis, a mosquito-borne virus, in […]


Privacy Risks of Sleep-Tracking Devices

1. Introduction

According to the technology market intelligence company “ABI Research”, there are currently more than 10 billion wirelessly connected devices. In 2030, the number of these devices will reach […]


Crowdsensing: State of the Art and Privacy Aspects

1. Introduction

It is estimated that today approximately three-quarters of the human population has a mobile phone. Crowdsensing, a new business model, allows this large number of mobile phones to […]


Human-implanted RFID chips

1. Introduction

In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as “bugs.” The device was a predecessor of the Radio-frequency identification […]


Ten Important Privacy Threats

1. Introduction

As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. […]


The Debate Over Network Neutrality in the EU and the USA

1. Introduction

Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs) should not control how their customers lawfully use […]


Privacy Implications of the Internet of Things



The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the […]


The new Google Maps: a perfect place for review fraud

1. Introduction

In 2006, Jeff Howe coined the concept of crowdsourcing. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in […]


Privacy Implications of Google Glass


Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eyes of the user. […]


PayPal: Chargebacks and Dispute Resolution


PayPal Inc. is a global provider of online payment services established in 1998 in Palo Alto, California. In 2012, PayPal Inc. generated a total revenue of $5.6 billion USD. […]


E -Money Fraud

1. Introduction

Electronic money (e-money) is the digital equivalent of cash that is stored on an electronic device or remotely at a server. It is a relatively new payment instrument […]

Software Patent Law: EU, New Zealand, and the US compared

Software Patent Law: EU, New Zealand, and the US compared

1. Introduction

A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the public […]


Legal Aspects of Online Gambling

1. Introduction

Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling Capital, one of the most widely […]


Mobile Phone Spying Software: Legality, Symptoms, and Removal


At present, there are many websites offering mobile phone spying software. Typical examples of such websites are SpyBubble (http://www.spybubble.com/), Mobile-Spy (http://www.mobile-spy.com/), and Stealthgenie (http://http://www.stealthgenie.com/). By installing mobile phone spying […]


Using Crowdsourcing for Collecting Information about Security Vulnerabilities


The concept of crowdsourcing was coined by Jeff Howe in 2006. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people […]