Loading...

Revenge porn: an open problem about privacy

In these days the problem of the revenge porn has been brought again to the attention of the italians by the case of Giulia Sarti. For the ill-unaware some intimate photos of the ex five-stars deputee Giulia Sarti has been shared online. Up to today we do not know who did this or why, but [...]

2019-03-20T11:54:30+00:00March 20th, 2019|Blog|

Cybersecurity act approved by European parliament

This Tuesday (13-03-2019) the European Parliament has approved the adoption of new norms to implement a certification system for Cybersecurity in the European Union. This system, aptly named Cybersecurity act, aims to guarantee that products and services sold on the European market will satisfy a certain standard for security requirements. A concern towards increased risks [...]

2019-03-20T11:39:56+00:00March 20th, 2019|Blog|

Hunt for security flaws with Windows Exploit Suggester

This software allows you to analyze the operating system to identify vulnerabilities and exploits that hackers can use to attack. How vulnerable are we to a cyber attack? Knowing it exactly is almost impossible. All we can do is to constantly update our software and operating system and, of course, use an antivirus program. Starting [...]

2019-03-20T11:34:52+00:00March 20th, 2019|Blog|

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of digital money that exist only in the online world, with no actual physical form. Users [...]

2019-03-20T11:35:31+00:00March 20th, 2019|Blog|

Cyber-Security: Members of the European Parliament Respond to the Chinese Digital Threat

Strasbourg 11-14/03/2019 Threats from China's growing technological presence in the EU, are referred to in a resolution that was deposited on Tuesday 12/03/2018. China's increased technological presence in the EU poses serious security threats requiring urgent action at EU level, says a draft resolution that was put to the vote on Tuesday 12/03/2019 in the [...]

2019-03-19T09:23:06+00:00March 19th, 2019|Blog|

We see and hear what others cannot…

Voltaire is attributed the quote that the most important decision one makes is to be in a good mood. There is a challenge that we are supposed to deal with in the CS-AWARE project: some members of what one may call the ‘digital society’ in the EU are more vulnerable to confront with cyber-attacks [...]

2019-03-10T17:34:31+00:00March 10th, 2019|Blog|

Larissa’s CS-Aware dissemination plan

The Municipality of Larissa, as pilot of the CS-AWARE program, will use it in order to be aware of potential threats against its data and to take the necessary precautions. However, cyber-attacks are threatening with the same dangerous way smaller LPAs that are offering equivalent services and administrate personal data (financial and identity data). [...]

2019-03-08T10:45:25+00:00March 8th, 2019|Blog|

Data breach is not necessarily just a consequence of a hacker attack

The new European Data Protection Regulation 679/2016 introduces the concept of Data Breach "as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmission, stored or otherwise processed" (Article 4(12)). The Working Party 29 identifies data breach in 3 categories: the "Confidentiality [...]

2019-03-07T15:36:51+00:00March 7th, 2019|Blog|

Cyber Security covers not only technological aspects

Social engineering is an expression used to describe persuasion techniques aimed at accessing personal data without exploiting technical vulnerabilities. The typical social engineering attack is definitely phishing, which uses both technical and persuasion to steal the personal information and credentials of a user. Attackers generally attempt to access the victim's financial and bank credits by [...]

2019-03-05T08:08:44+00:00March 5th, 2019|Blog|

Big Cyber, Bigger Threats

The ‘Foreign Affairs’ online publication (US) had an interesting article on cyber security, ‘Cyber Week in Review, February 1, 2019’ called ‘Big Cyber, Bigger Threats’, where a worldwide threat assessment report was published driven by the US Senate Select Committee on Intelligence. There the cyberattacks and ‘online influence operations and election interference’ are listed as [...]

2019-10-03T14:26:34+00:00February 22nd, 2019|Blog|
Go to Top