Center for Security Research Articles,Publications CSR was part of the research project on cyber bullying

CSR was part of the research project on cyber bullying


On January 31st 2022, three WEASA alumni members from different editions presented their research on cyberbullying in Macedonia and Serbia. One of the researchers was Oliver Risteski MA, our Head of the Department for Law Enforcement Research. The valuable piece of the research caught the attention of the attendees, who shared their appreciation and feedback after the presentation, and demonstrated their deep interest in the topic. The research found out that mostly women and underaged girls are under attack by ex-husbands or ex-partners/boyfriends who share personal photos online without their consent, conduct blackmail, and harass for revenge or other reasons. 

On the following link you can find the full research with the recommendations:

https://www.weasa.org/wp-content/uploads/2021/02/Research-on-cyber-stalking-in-North-Macedonia-and-Serbia.pdf

Related Post

Cyber Espionage and its ImpactsCyber Espionage and its Impacts

Blagoja Janakievski

In the newest operational warfare domain, cyberspace, there are armies of nefarious hackers from around the globe who use cyber warfare for economic, political, or military gain. One aspect of cyber warfare that needs to be looked upon more closely is cyber espionage. Cyber spying is the act of engaging in an attack or series of attacks that let an unauthorized user or users view classified of sensitive material. These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a corporate or government entity. The goal is typically to acquire intellectual property or government secrets. Attacks can be motivated by greed or profit, and can be used in conjunction with a military operation or as an act of terrorism. Consequences can range from loss of competitive advantage to loss of materials, data, infrastructure, or loss of life. (more…)

Psychological aspects of modern warfarePsychological aspects of modern warfare

Aleksandar Nacev

While war has long been viewed as a competition between adversaries, peace has been defined by absence of such conflict. But what happens when the line between war and peace is blurred and hardly visible? Countries today face a number of actors who use a wide range of political, informational, military, and economic measures to influence, coerce, intimidate, or undermine its interests or those of its friends and allies. To accomplish military goals without putting one’s nation, civilians, or even opposition troops at mortal risk is certainly the ideal manner in which to win a war. (more…)

Cybersecurity basics more important than ever in the new normal of remote workCybersecurity basics more important than ever in the new normal of remote work

Blagoja Janakievski

In this new work-from-anywhere environment that we’re all in thanks to the COVID-19 pandemic, cybersecurity, trust, and protecting customer data is more important than ever. We saw the largest workforce transmit transformation in history as everyone went remote almost overnight in March 2020.

The best thing that any business can do in securing yourself, especially as adapting to this new environment, this new work from anywhere environment, is to nail the basics. There are a small number of really important cybersecurity hygiene actions, so think about it in the current climate as washing your hands from a cybersecurity perspective, that businesses can do to really eliminate the risk associated with a lot of common cybersecurity threats. So some examples of this are enabling strong multi-factor authentication or ensuring that you’re rapidly patching all of your devices to it to inoculate them against known vulnerabilities, to prevent things like ransomware attacks. And then finally, treating cybersecurity like a team sport, building a culture of awareness in your company so that all the employees in your company can act like security trailblazers.

(more…)