Lab Blog

The Tech4Humanity Lab blog is comprised of research and general interests posts from lab students and faculty.

  • Safeguarding Digital Rights in the EU: The Evolving Landscape of Data Protection and Content Moderation

    Safeguarding Digital Rights in the EU: The Evolving Landscape of Data Protection and Content Moderation

    The European Union has made significant strides in protecting digital rights by introducing of comprehensive laws, most notably the General Data Protection Regulation (GDPR) and the proposed Digital Services Act (DSA). The GDPR, which came into effect in 2018, is a far-reaching data protection law that applies to any organization processing the personal data…

  • Understanding Poland’s Spyware Probe

    Understanding Poland’s Spyware Probe

    Poland’s inquiry into the use of mercenary spyware is a groundbreaking initiative towards achieving accountability against the misuse of digital surveillance tools. The probe beginning in early 2024 was founded on allegations by civil society against the former ruling Law and Justice (PiS) Party for the targeting of up to six hundred individuals with…

  • Methods of the Heart: The Vulnerabilities of Rechargeable Pacemakers

    Methods of the Heart: The Vulnerabilities of Rechargeable Pacemakers

    According to Yale University there are over 3 million people in the United States who use pacemakers to prevent or treat too slow, too fast, or irregular heartbeat. Pacemakers are small, implanted battery-powered devices that help regulate the rhythm of the heartbeat. They include electrodes that deliver electrical impulses to one’s heart to make…

  • Case Study: Black Basta Ransomware Operator Group

    Case Study: Black Basta Ransomware Operator Group

    The Black Basta Ransomware Operator group is an infamous organization in the world of cybercrime, known for its ransomware attacks on organizations throughout the world. The group’s efforts showed a significant rise in the complexity and effects of ransomware attacks and how devastating they can be. The Russian-based group reportedly tallied over $107 million…

  • Ransomware Threats on Health Care Services

    Ransomware Threats on Health Care Services

    “Ransomware is a type of malware used by cyber criminals who encrypt files and then extort money in return for unlocking these files”[1]. The ransoms demanded are most often in the form of bitcoin or other forms of cryptocurrency which allow for the sender and demanding party to remain anonymous. In the past, ransomware…

  •  Exploring Ransomware attack trends during the COVID-19 Pandemic in the United States

     Exploring Ransomware attack trends during the COVID-19 Pandemic in the United States

    Covid-19 has had lasting effects on the world with its impact on societal, infrastructure, and political landscapes. One of the more notable consequences has been the increase in ransomware attacks. These attacks are usually targeted toward certain companies, industries, or sectors. Ransomware is a form of malware that is evolving continuously as time goes…

  • Cuba Group Profile

    Cuba Group Profile

    Cybercrime is a constantly growing and evolving threat in today’s technological-driven society, compromising governments, businesses, and many people worldwide. Among many strategies cybercriminals utilize for their personal agenda, ransomware attacks have become one of the most prevalent and common types of cyberattack in recent years. Ransomware is a specific type of malware that prevents…

  • Smart Insulin Pen: Opportunities, Challenges and Vulnerabilities

    Smart Insulin Pen: Opportunities, Challenges and Vulnerabilities

    Diabetes management has steadily advanced along with the development of new technology. An important step in improving insulin delivery was the introduction of smart insulin pens that enhanced dosing accuracy and convenience of use. Smart Insulin Pens (SIPs) revolutionized diabetes care by introducing real time wireless connectivity, digital dose tracking, and integration with personalized…

  • Vulnerability Analysis of AI Camera-Based Facial Recognition Systems

    Vulnerability Analysis of AI Camera-Based Facial Recognition Systems

    This research paper delves into the evaluation of two facial recognition software, one open-source and one paid version, Vladmandic and Visage SDK accordingly. Prior to the testing of a non-invasive Institutional Review Board (IRB) protocol involving 10 lab-team members in a lab environment, an initial hypothesis was formed suggesting that facial recognition software carries…

  • Using Parametric Sentiment Analysis Of Russian Telegram To Identify and Understand Human Rights Violations In Occupied Areas Of Ukraine

    Using Parametric Sentiment Analysis Of Russian Telegram To Identify and Understand Human Rights Violations In Occupied Areas Of Ukraine

    AI-based sentiment analysis has recently proven useful through the mining of large amounts of text. These texts can be drawn from various sources, but most valuably can be used to reach conclusions about public opinion, especially regarding current events. As a result, sentiment analysis provides a method for researchers to determine public opinion under…