Loading...

Use of standards for cyberthreat intelligence exchange

The cyber threat landscape is rapidly evolving. New cyber threats as well as vulnerabilities emerge at a great pace and become more severe and persistent. Furthermore, due to the dynamic nature of modern cyber threats, they are becoming more autonomous and complex and they are thus able to use more sophisticated techniques to exploit the [...]

2019-07-22T13:01:15+00:00February 22nd, 2019|Blog|

Do you believe that the risk of becoming a victim of cybercrime is increasing?

Citizens all over the world are deeply concerned about the protection of their private life and their security. For example, 9 out of to 10 users consider that cyber-crime is a threat to their country, declaring that “it is a major challenge to national security”. Citizens are feeling threatened by cyber-crime and are very skeptic [...]

2019-02-18T08:59:41+00:00February 18th, 2019|Blog|

Quality Assessment CTI

One of the latest CS-AWARE deliverables focused on generally identifying possible external information sources to be used for CS-AWARE that can help in analysing LPA cybersecurity incidents and help raise cybersecurity awareness. The main task was to find a way to assess the relevance and quality of those sources (and additional sources that have emerged [...]

2019-01-30T18:53:52+00:00January 30th, 2019|Blog|

Collaboration and Cybersecurity

What does cybersecurity have to do with collaboration? A simple answer would be that cybersecurity is not an issue for one individual to be handled, but for the entire organisation, or even at the national and international level. What is this collaboration then, and what can it be like? In our book (entitled “On Collaboration, [...]

2019-02-19T12:16:57+00:00January 11th, 2019|Blog|

Greek and Turkish in cyber-war tension

It was late afternoon, some months ago, when a Greek construction company’s employee, who is in charge of managing E.U. projects, had to deal with a strange situation. Instead of her homepage in the browser, the red flag of Turkey appeared. Firstly she tried to retype the correct address, but she was again redirected in [...]

2019-01-04T09:17:23+00:00January 4th, 2019|Blog|

Knowledge management and cybersecurity

There are many ways for defining knowledge management. One of the ways to see it is as the systematic procedures by which the flow of information and knowledge throughout an organization becomes a shared process, reaching the relevant persons. It should ensure that knowledge does not get lost when people leave or are absent. [...]

2019-02-19T12:10:46+00:00December 20th, 2018|Blog|

InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference

InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software communities, where several open-source software communities participated in it, including the Hellenic Linux User Group [...]

2019-01-09T12:12:28+00:00November 22nd, 2018|Blog|

Facebook Hack: 50 million Facebook users’ access stolen using zero-day flaw

According to a blog post published on September 28th, 2018 by Facebook (FB), their engineering team discovered that 50 million accounts were affected by a security issue. Practically, a vulnerability in FB code allowed hackers to steal FB access tokens. The full article can be read here. It is interesting to have a look at [...]

2019-10-03T14:02:11+00:00November 16th, 2018|Blog|

Raising a son in the era of social networks

Each day we share on the web a huge amount of data about us and our behaviours. This is a concern for the privacy and security of adult users but it becomes a huge problem where underage children are involved. According to the last report of the english Children Commissioner “Who knows what about [...]

2018-11-14T14:54:44+00:00November 14th, 2018|Blog|
Go to Top