Skip to main content

Posts

Tracing Shadows: The Evolution of Crime from Streets to Cyberspace

Introduction: The Evolution of Crime and Cybercrime For most of history, crime scenes were tangible places marked by physical evidence: a blown safe, a getaway car’s tire tracks, a victim’s belongings. Detectives pursued leads by pounding the pavement, interviewing witnesses, and collecting fingerprints or DNA. But in the late 20th century, a new kind of crime scene emerged, one made of bits and bytes, lurking behind screens and networks. As society’s personal and financial life moved online, criminals followed, committing theft, fraud, and even acts of sabotage through keyboards rather than crowbars. Law enforcement soon realized that solving modern crimes often meant tracing shadows in cyberspace as much as on city streets. This evolution did not happen overnight. Early computer crimes in the 1980s were fringe occurrences handled by a handful of tech-savvy officers. By the 2020s, however, digital evidence is featured in roughly  90% of all criminal cases . Traditional police wor...
Recent posts

Android vs iPhone Security: Why No System is 100% Secure

When I went to the CYBERUS Spring School in early April 2025 (April 7–11, 2025, at Université Bretagne Sud in Lorient, France), one of the topics we talked about was the age old query: Which phone is safer, the  iPhone or the  Android ? The conversations were instructive to me as a security enthusiast. We discussed technical ideas like mobile app sandboxing and even how two apps from the same developer could access data in spite of platform security measures. The discussions underlined an important realization I've had over the years: while IOS and Android both have robust security mechanisms, neither is completely impenetrable. In this essay, I'll provide a professional (but hopefully easy-to-read) analysis of Android vs iPhone security, interspersed with my own viewpoints, demonstrating why no system can claim perfect security. Security by Design: IOS and Android Approaches Apple's IOS and Google's Android have fundamentally different approa...

Behavioural Authentication System : Introduction

Behavioral authentication is an emerging paradigm that leverages unique human behaviors—such as keystroke dynamics, mouse movements, and gait patterns—to verify identities continuously and unobtrusively. This review by Wang et al. categorizes behavioral authentication into three complementary levels—identity, conformity, and benignity—each addressing distinct security and safety concerns within digital systems ( sands.edpsciences.org ). After tracing its evolution from traditional, intrusive methods (passwords, tokens, biometrics) to frictionless, continuous approaches, the article surveys state-of-the-art studies across these three levels. It then examines key challenges—data variability, model robustness, privacy, and integration with existing infrastructures—and outlines promising research directions such as multimodal fusion, explainable AI, and adaptive systems to foster a safer, more secure cyberspace ( sands.edpsciences.org ). Introduction to Behavioral Authentication Behavior...