Skip to content
Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Cyber Incident Response // Cyber Security // Cyber Crime // Cyber Terrorism // Cyber Defense

  • Project ACRAC: Advanced Cybersecurity Risk Assessment Checklist
  • What I do

Month: December 2022

What is Cyber Terrorism?

What is Cyber Terrorism?
December 13, 2022December 13, 2022 ~ larshilse ~ Leave a comment

Cyber terrorism is the use of computer networks and technology to disrupt, damage, or destroy critical infrastructure or cause widespread fear and panic among the general population. This can include attacks on government websites, power grids, or other critical systems, as well as the use of viruses or other malicious software to damage or disrupt … Continue reading What is Cyber Terrorism?

AI in Cyberwarfare

AI in Cyberwarfare
December 13, 2022December 13, 2022 ~ larshilse ~ Leave a comment

As advances in artificial intelligence (AI) continue to accelerate, many people are wondering how AI will impact the world of cyberwarfare. While it is difficult to predict the exact ways in which AI will be used in this context, it is clear that it will play a significant role in shaping the future of cyberconflict. … Continue reading AI in Cyberwarfare

About this Blog

These are my opinions on #CyberSecurity, #Cybercrime, #CyberTerrorism, #CyberDefense, et al.

I publish using dictation tools; find a typo? You’re welcome to keep it.

My publications, appearances, projects, etc. can be here on TOR: http://larshilse3xpyawo.onion/ ; if you can’t use TOR, use this link through the clear web: https://larshilse3xpyawo.tor2web.xyz

Contact

Email: [email protected] PGP: 44D5 68A1 32A1 AD87 3E29 2AA2 9B4A 1674 17FF C660

Phone: +49 (0)4835 9513027

Please use my full name in the “To” line with my email address, as this will make your message look less like spam. This will happen automatically if you have me in your address book. If you just type in my email address, I probably won’t see your mail.

Recent Posts

  • So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.
  • Corporate Eavesdropping: Why This Isn’t Just an “IT Problem”
  • The Malicious Insider: and why you should loose sleep over him
  • Socio-Technical Cybersecurity – The Human Clusterfuck in Cybersecurity and why Your Firewall Won’t Save You When Karen Clicks a Phishing Link
  • China’s Drone Warfare Advances: A Bloody Game-Changer for Global Security

Archives

  • May 2025
  • April 2025
  • December 2022
  • March 2020
  • October 2019
  • June 2019
  • May 2019
  • February 2019
  • November 2018
  • October 2018
  • July 2018

Categories

  • ACRAC (16)
  • Application security (9)
  • ceo fraud (4)
  • corporate risks (2)
  • crytocurrency (1)
  • cyber crime (18)
  • cyber defence (3)
  • cyber security (24)
  • cyber terrorism (2)
  • dark web (3)
  • digital ethics (7)
  • global risks (24)
  • infosec reader questions (6)
  • privacy (11)
  • risk management (37)
  • social engineering (4)
  • Uncategorized (4)
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Proudly powered by WordPress ~ Theme: Penscratch 2 by WordPress.com.