About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

Hunt for security flaws with Windows Exploit Suggester

This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to constantly update our software and operating system and, of course, use an antivirus program. Starting [...]

2019-03-20T11:34:52+00:00March 20th, 2019|Blog|

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of digital money that exist only in the online world, with no actual physical form. Users [...]

2019-03-20T11:35:31+00:00March 20th, 2019|Blog|

Cyber-Security: Members of the European Parliament Respond to the Chinese Digital Threat

Strasbourg 11-14/03/2019 Threats from China's growing technological presence in the EU, are referred to in a resolution that was deposited on Tuesday 12/03/2018. China's increased technological presence in the EU poses serious security threats requiring urgent action at EU level, says a draft resolution that was put to the vote on Tuesday 12/03/2019 in the [...]

2019-03-19T09:23:06+00:00March 19th, 2019|Blog|

We see and hear what others cannot…

Voltaire is attributed the quote that the most important decision one makes is to be in a good mood. There is a challenge that we are supposed to deal with in the CS-AWARE project: some members of what one may call the ‘digital society’ in the EU are more vulnerable to confront with cyber-attacks [...]

2019-03-10T17:34:31+00:00March 10th, 2019|Blog|

Larissa’s CS-Aware dissemination plan

The Municipality of Larissa, as pilot of the CS-AWARE program, will use it in order to be aware of potential threats against its data and to take the necessary precautions. However, cyber-attacks are threatening with the same dangerous way smaller LPAs that are offering equivalent services and administrate personal data (financial and identity data). [...]

2019-03-08T10:45:25+00:00March 8th, 2019|Blog|

Data breach is not necessarily just a consequence of a hacker attack

The new European Data Protection Regulation 679/2016 introduces the concept of Data Breach "as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmission, stored or otherwise processed" (Article 4(12)). The Working Party 29 identifies data breach in 3 categories: the "Confidentiality [...]

2019-03-07T15:36:51+00:00March 7th, 2019|Blog|

Cyber Security covers not only technological aspects

Social engineering is an expression used to describe persuasion techniques aimed at accessing personal data without exploiting technical vulnerabilities. The typical social engineering attack is definitely phishing, which uses both technical and persuasion to steal the personal information and credentials of a user. Attackers generally attempt to access the victim's financial and bank credits by [...]

2019-03-05T08:08:44+00:00March 5th, 2019|Blog|

Big Cyber, Bigger Threats

The ‘Foreign Affairs’ online publication (US) had an interesting article on cyber security, ‘Cyber Week in Review, February 1, 2019’ called ‘Big Cyber, Bigger Threats’, where a worldwide threat assessment report was published driven by the US Senate Select Committee on Intelligence. There the cyberattacks and ‘online influence operations and election interference’ are listed as [...]

2019-10-03T14:26:34+00:00February 22nd, 2019|Blog|

Use of standards for cyberthreat intelligence exchange

The cyber threat landscape is rapidly evolving. New cyber threats as well as vulnerabilities emerge at a great pace and become more severe and persistent. Furthermore, due to the dynamic nature of modern cyber threats, they are becoming more autonomous and complex and they are thus able to use more sophisticated techniques to exploit the [...]

2019-07-22T13:01:15+00:00February 22nd, 2019|Blog|
Go to Top