Loading...
Blog2021-02-16T10:39:13+00:00
2003, 2019

Hunt for security flaws with Windows Exploit Suggester

This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to [...]

2003, 2019

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of [...]

1003, 2019

We see and hear what others cannot…

Voltaire is attributed the quote that the most important decision one makes is to be in a good mood. There is a challenge that we are supposed to deal with in the CS-AWARE project: some members of what one [...]

803, 2019

Larissa’s CS-Aware dissemination plan

The Municipality of Larissa, as pilot of the CS-AWARE program, will use it in order to be aware of potential threats against its data and to take the necessary precautions. However, cyber-attacks are threatening with the same dangerous way [...]

703, 2019

Data breach is not necessarily just a consequence of a hacker attack

The new European Data Protection Regulation 679/2016 introduces the concept of Data Breach "as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmission, stored or otherwise [...]

503, 2019

Cyber Security covers not only technological aspects

Social engineering is an expression used to describe persuasion techniques aimed at accessing personal data without exploiting technical vulnerabilities. The typical social engineering attack is definitely phishing, which uses both technical and persuasion to steal the personal information and credentials [...]

2202, 2019

Big Cyber, Bigger Threats

The ‘Foreign Affairs’ online publication (US) had an interesting article on cyber security, ‘Cyber Week in Review, February 1, 2019’ called ‘Big Cyber, Bigger Threats’, where a worldwide threat assessment report was published driven by the US Senate Select Committee [...]

2202, 2019

Use of standards for cyberthreat intelligence exchange

The cyber threat landscape is rapidly evolving. New cyber threats as well as vulnerabilities emerge at a great pace and become more severe and persistent. Furthermore, due to the dynamic nature of modern cyber threats, they are becoming more autonomous [...]

Go to Top