About CSAwareAdm

This author has not yet filled in any details.
So far CSAwareAdm has created 155 blog entries.

What is cryptojacking?

Cryptojacking (also called malicious cryptomining) is an emerging online threat that hides on people’s devices (computers, smartphones, tablets or even servers), without their consent or knowledge, and uses the machine’s resources to secretly mine cryptocurrencies. Cryptocurrency is a form of digital money that exist only in the online world, with no actual physical form. Users [...]

By |2019-03-20T11:35:31+00:00March 20th, 2019|Blog|0 Comments

Cyber-Security: Members of the European Parliament Respond to the Chinese Digital Threat

Strasbourg 11-14/03/2019 Threats from China's growing technological presence in the EU, are referred to in a resolution that was deposited on Tuesday 12/03/2018. China's increased technological presence in the EU poses serious security threats requiring urgent action at EU level, says a draft resolution that was put to the vote on Tuesday 12/03/2019 in the [...]

By |2019-03-19T09:23:06+00:00March 19th, 2019|Blog|0 Comments

We see and hear what others cannot…

Voltaire is attributed the quote that the most important decision one makes is to be in a good mood. There is a challenge that we are supposed to deal with in the CS-AWARE project: some members of what one may call the ‘digital society’ in the EU are more vulnerable to confront with cyber-attacks [...]

By |2019-03-10T17:34:31+00:00March 10th, 2019|Blog|0 Comments

Larissa’s CS-Aware dissemination plan

The Municipality of Larissa, as pilot of the CS-AWARE program, will use it in order to be aware of potential threats against its data and to take the necessary precautions. However, cyber-attacks are threatening with the same dangerous way smaller LPAs that are offering equivalent services and administrate personal data (financial and identity data). [...]

By |2019-03-08T10:45:25+00:00March 8th, 2019|Blog|0 Comments

Data breach is not necessarily just a consequence of a hacker attack

The new European Data Protection Regulation 679/2016 introduces the concept of Data Breach "as a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmission, stored or otherwise processed" (Article 4(12)). The Working Party 29 identifies data breach in 3 categories: the "Confidentiality [...]

By |2019-03-07T15:36:51+00:00March 7th, 2019|Blog|0 Comments

Cyber Security covers not only technological aspects

Social engineering is an expression used to describe persuasion techniques aimed at accessing personal data without exploiting technical vulnerabilities. The typical social engineering attack is definitely phishing, which uses both technical and persuasion to steal the personal information and credentials of a user. Attackers generally attempt to access the victim's financial and bank credits by [...]

By |2019-03-05T08:08:44+00:00March 5th, 2019|Blog|0 Comments

Big Cyber, Bigger Threats

The ‘Foreign Affairs’ online publication (US) had an interesting article on cyber security, ‘Cyber Week in Review, February 1, 2019’ called ‘Big Cyber, Bigger Threats’, where a worldwide threat assessment report was published driven by the US Senate Select Committee on Intelligence. There the cyberattacks and ‘online influence operations and election interference’ are listed as [...]

By |2019-10-03T14:26:34+00:00February 22nd, 2019|Blog|0 Comments

Use of standards for cyberthreat intelligence exchange

The cyber threat landscape is rapidly evolving. New cyber threats as well as vulnerabilities emerge at a great pace and become more severe and persistent. Furthermore, due to the dynamic nature of modern cyber threats, they are becoming more autonomous and complex and they are thus able to use more sophisticated techniques to exploit the [...]

By |2019-07-22T13:01:15+00:00February 22nd, 2019|Blog|0 Comments

Possible sources of tension

The first round of story workshops in our two municipalities were organised in October and November of 2018. Here are some general findings, based on just a small set of stories that we collected. First, and this is not a shocking result at all, we can suggest improvements in management of knowledge. There can be [...]

By |2019-02-19T12:14:20+00:00February 19th, 2019|Blog|0 Comments

Do you believe that the risk of becoming a victim of cybercrime is increasing?

Citizens all over the world are deeply concerned about the protection of their private life and their security. For example, 9 out of to 10 users consider that cyber-crime is a threat to their country, declaring that “it is a major challenge to national security”. Citizens are feeling threatened by cyber-crime and are very skeptic [...]

By |2019-02-18T08:59:41+00:00February 18th, 2019|Blog|0 Comments