Hunt for security flaws with Windows Exploit Suggester
This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to [...]
What is cryptojacking?
Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of [...]
Cyber-Security: Members of the European Parliament Respond to the Chinese Digital Threat
Strasbourg 11-14/03/2019 Threats from China's growing technological presence in the EU, are referred to in a resolution that was deposited on Tuesday 12/03/2018. China's increased technological presence in the EU poses serious security threats requiring urgent action at EU level, [...]
We see and hear what others cannot…
Voltaire is attributed the quote that the most important decision one makes is to be in a good mood. There is a challenge that we are supposed to deal with in the CS-AWARE project: some members of what one [...]
Larissa’s CS-Aware dissemination plan
The Municipality of Larissa, as pilot of the CS-AWARE program, will use it in order to be aware of potential threats against its data and to take the necessary precautions. However, cyber-attacks are threatening with the same dangerous way [...]
Data breach is not necessarily just a consequence of a hacker attack
The new European Data Protection Regulation 679/2016 introduces the concept of Data Breach "as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmission, stored or otherwise [...]
Cyber Security covers not only technological aspects
Social engineering is an expression used to describe persuasion techniques aimed at accessing personal data without exploiting technical vulnerabilities. The typical social engineering attack is definitely phishing, which uses both technical and persuasion to steal the personal information and credentials [...]
Big Cyber, Bigger Threats
The ‘Foreign Affairs’ online publication (US) had an interesting article on cyber security, ‘Cyber Week in Review, February 1, 2019’ called ‘Big Cyber, Bigger Threats’, where a worldwide threat assessment report was published driven by the US Senate Select Committee [...]
Use of standards for cyberthreat intelligence exchange
The cyber threat landscape is rapidly evolving. New cyber threats as well as vulnerabilities emerge at a great pace and become more severe and persistent. Furthermore, due to the dynamic nature of modern cyber threats, they are becoming more autonomous [...]