Possible sources of tension

The first round of story workshops in our two municipalities were organised in October and November of 2018. Here are some general findings, based on just a small set of stories that we collected. First, and this is not a shocking result at all, we can suggest improvements in management of knowledge. There can be [...]

By |2019-02-19T12:14:20+00:00February 19th, 2019|Blog|0 Comments

Do you believe that the risk of becoming a victim of cybercrime is increasing?

Citizens all over the world are deeply concerned about the protection of their private life and their security. For example, 9 out of to 10 users consider that cyber-crime is a threat to their country, declaring that “it is a major challenge to national security”. Citizens are feeling threatened by cyber-crime and are very skeptic [...]

By |2019-02-18T08:59:41+00:00February 18th, 2019|Blog|0 Comments

Quality Assessment CTI

One of the latest CS-AWARE deliverables focused on generally identifying possible external information sources to be used for CS-AWARE that can help in analysing LPA cybersecurity incidents and help raise cybersecurity awareness. The main task was to find a way to assess the relevance and quality of those sources (and additional sources that have emerged [...]

By |2019-01-30T18:53:52+00:00January 30th, 2019|Blog|0 Comments

Collaboration and Cybersecurity

What does cybersecurity have to do with collaboration? A simple answer would be that cybersecurity is not an issue for one individual to be handled, but for the entire organisation, or even at the national and international level. What is this collaboration then, and what can it be like? In our book (entitled “On Collaboration, [...]

By |2019-02-19T12:16:57+00:00January 11th, 2019|Blog|0 Comments

Greek and Turkish in cyber-war tension

It was late afternoon, some months ago, when a Greek construction company’s employee, who is in charge of managing E.U. projects, had to deal with a strange situation. Instead of her homepage in the browser, the red flag of Turkey appeared. Firstly she tried to retype the correct address, but she was again redirected in [...]

By |2019-01-04T09:17:23+00:00January 4th, 2019|Blog|0 Comments

Knowledge management and cybersecurity

There are many ways for defining knowledge management. One of the ways to see it is as the systematic procedures by which the flow of information and knowledge throughout an organization becomes a shared process, reaching the relevant persons. It should ensure that knowledge does not get lost when people leave or are absent. [...]

By |2019-02-19T12:10:46+00:00December 20th, 2018|Blog|0 Comments

InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference

InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software communities, where several open-source software communities participated in it, including the Hellenic Linux User Group [...]

By |2019-01-09T12:12:28+00:00November 22nd, 2018|Blog|0 Comments

Facebook Hack: 50 million Facebook users’ access stolen using zero-day flaw

According to a blog post published on September 28th, 2018 by Facebook (FB), their engineering team discovered that 50 million accounts were affected by a security issue. Practically, a vulnerability in FB code allowed hackers to steal FB access tokens. The full article can be read here. It is interesting to have a look at [...]

By |2019-10-03T14:02:11+00:00November 16th, 2018|Blog|0 Comments

Raising a son in the era of social networks

Each day we share on the web a huge amount of data about us and our behaviours. This is a concern for the privacy and security of adult users but it becomes a huge problem where underage children are involved. According to the last report of the english Children Commissioner “Who knows what about [...]

By |2018-11-14T14:54:44+00:00November 14th, 2018|Blog|0 Comments

5G era and cybersecurity

Fifth-generation mobile networks or fifth-generation wireless systems, also known as “5G,” are the proposed next telecommunications standards and are likely to appear in the market in 2020. 5G networks are going to be very heterogeneous and complex compared to the current ones but in the same time are expected to meet high-end requirements. Among them, [...]

By |2019-01-09T12:11:13+00:00November 14th, 2018|Blog|0 Comments