About CS-AWARE

This author has not yet filled in any details.
So far CS-AWARE has created 176 blog entries.

Teleworking and cybersecurity during the COVID-19 pandemic

The COVID-19 pandemic created an increased need for remote working, not only for the system administrators, but also for the vast majority of the employees. Several technological solutions were extensively employed, one of which being the Virtual Private Network (VPN). This allowed employees to securely connect to their organisation’s internal network and carry out their [...]

2020-10-12T10:11:45+00:00March 12th, 2020|Blog|

4 out of 10 users will change their online habits in 2020

Radical changes in their digital tendencies are being launched by users around the world for 2020; more than 4 in 10 will change their digital routine in 2020, creating new digital expectations for the new year. According to a recent Kaspersky survey, the majority of people aim to reduce the time spent with their various [...]

2020-01-27T13:25:12+00:00January 27th, 2020|Blog|

NSA reveals a perilous security issue in Windows 10

The US National Security Service (NSA) has discovered a serious security problem in Windows 10, which could be used by hackers for creating malicious software that, at a first glance, looks legitimate. Microsoft released a patch and pointed out that no evidence has been seen that the bug was actually used by a hacker. According [...]

2020-01-27T13:22:36+00:00January 27th, 2020|Blog|

Thousands of websites distribute malware on macOS

In 2019, Kaspersky prevented attacks by Shlayer, a malicious Trojan family, on at least 10% of devices using Kaspersky Mac protection solutions, making this threat the most widespread for MacOS users. An intelligent malware distribution system is spreading through a network of affiliates, entertainment websites, and even Wikipedia, proving that even users who visit only [...]

2020-01-27T08:59:56+00:00January 27th, 2020|Blog|

1 out of 8 companies in Europe has been under attack on their IT systems during 2019

European companies intesify their efforts to remain safe from cyber attacks. During 2019, 90% of them, which have 10 or more employees, have gotten at least one security measure regarding their computer and communications systems. According to published data, one out of three enterprises (34%) declared that they have documents, practices or procedures related to [...]

2020-01-20T17:59:28+00:00January 20th, 2020|Blog|

ToTok; the “not only” chat app

There has been a widely spread suspicion that smartphone chat applications serve as mass surveillance tools for intelligence agencies of various countries around the world. ToTok, one of the most popular chat applications, is believed by the Unite States Intelligence Community to be such an application. The New York Times revealed ToTok messaging app to [...]

2020-01-15T11:53:43+00:00January 15th, 2020|Blog|

Cybersecurity Awareness for municipalities: what are the training needs?

We have now finished a first round of tests to evaluate how our users work with the CS-AWARE system in their own contexts. The users were tested with simulations: for various reasons it was better to ‘inject’ cyberthreats than to wait for them to happen in real time. As a consequence, our users were subjected [...]

2020-01-15T11:50:15+00:00January 15th, 2020|Blog|

We have to seize an ambitious challenge and build a sustainable new business venture out of our project!

In the last months we also had experienced a change in the CS-AWARE consortium: partner University of Passau in Germany has left the project and was replaced by new partner, the University of St. Gallen in Switzerland. If one expects to find any Machiavellian conspiracies there has been none! The original project application had been [...]

2020-01-15T11:47:03+00:00January 15th, 2020|Blog|

ESET discovered an abnormal installing technique

ESET research team, during the analysis of cyber attack aiming for Middle East targets, detected a technically interesting downloader. The malware uses a number of contradictory techniques, one of them standing out: the insertion of a local port monitor system registered as “Default Print Monitor”. Due to this technique, ESET researches have named the downloader [...]

2020-01-15T11:13:32+00:00January 15th, 2020|Blog|

Threat predictions for 2020

Increase in complexity and sophistication as well as more targeted attacks are expected in the upcoming 12 months based on cyber crime activity of the past year, according to various resources that have conducted research over the subject. Advancements in artificial intelligence and machine learning have resulted in significant technological gains, but threat actors are [...]

2020-01-15T11:10:37+00:00January 15th, 2020|Blog|
Go to Top