An introduction is presented in which the editor discusses various reports within the issue on topics including a hash function for a content-based image authentication mechanism, SNOW 3G generator in long-term evolution communications, and fake profiles on the online social networking site Twitter.