Dimitar Kostadinov

Dimitar Kostadinov applied for a 6-year Master’s program in Bulgarian and European Law at the University of Ruse, and was enrolled in 2002 following high school. He obtained a Master degree in 2009. From 2008-2012, Dimitar held a job as data entry & research for the American company Law Seminars International and its Bulgarian-Slovenian business partner DATA LAB. In 2011, he was admitted Law and Politics of International Security to Vrije Universiteit Amsterdam, the Netherlands, graduating in August of 2012. Dimitar also holds an LL.M. diploma in Intellectual Property Rights & ICT Law from KU Leuven (Brussels, Belgium). Besides legal studies, he is particularly interested in Internet of Things, Big Data, privacy & data protection, electronic contracts, electronic business, electronic media, telecoms, and cybercrime. Dimitar attended the 6th Annual Internet of Things European summit organized by Forum Europe in Brussels.
Dimitar Kostadinov

Engineering personality analysis from machine learning

From social media to eye movement to handwriting, there are numerous ways to uncover your personality traits — and for cybercriminals to exploit them.

Engineering speech recognition from machine learning

The goal of speech recognition is to translate spoken words into text, and machine learning is helping it evolve.

Engineering voice impersonation from machine learning

Voice cloning can become a problem as scammers use it in new ploys to get money from people and corporations.

Information and asset classification in the CISSP exam

Information and asset classification is covered in domain 2 of the CISSP exam. Learn what you need to know to earn your CISSP certification.

Machine learning for social engineering

Social engineering is a form of communication that aims at gaining people’s trust at first and then prompting them to share sensitive information or do somet

Common vulnerability assessment types

A vulnerability assessment is a process so complicated that it often requires a comprehensive approach. This would mean that a multiple sub-assessments are t

Common security threats discovered through vulnerability assessments

A vulnerability assessment can efficiently highlight a huge number of diverse security issues. Here are our top 10 security threats that companies may stumbl

Data integrity and backups

Introduction Data integrity means that a given data set is accurate, complete, consistent, unchanged (original or a true copy) and trustworthy throughout it

Spoofing and Anonymization (Hiding Network Activity)

Introduction Forensic investigators should always pay heed to the possibility of a cybercriminal to have been using spoofing and anonymizing techniques to c

Deanonymizing Tor using ML

Standard Tor Traffic and Machine Learning /ML/  Unlike conventional non-Tor encrypted traffic that comes with openly visible destination attributes such as

Case Studies in Poor Password Management

Introduction In essence, a password is a cryptographic secret that needs proper storage and management. Even for individual users this can be a difficult ta

Security in a Blue Data Background Illustration

IoT security fundamentals: IoT vs OT (Operational Technology)

Introduction: Knowing the Notions  Industrial Internet of Things (IIoT) incorporates technologies such as machine learning, machine-to-machine (M2M) commu