Παρασκευή 28 Νοεμβρίου 2014

Imagine Never Being Alone

Someone looking over your shoulder, recording every computer keystroke; reading and listening to your private Skype conversations; using your phone’s microphone and camera to monitor you and your colleagues, without you even knowing ...

Δευτέρα 24 Νοεμβρίου 2014

The Ghost of Christmas Yet to Come

Attention holiday shoppers, beware of cyber criminals who are out to steal money and personal information. Scammers use many techniques to defraud consumers, from phishing e-mails offering too good to be true deals on brand-name merchandise to offering quick cash to victims who will re-ship packages to additional destinations. Previously reported scams are still being executed toda...

Security Impediments the Use of Electronic Transactions

European consumers show wary regarding online shopping and online transactions, despite the fact that, in recent years, both specific transaction categories indicate significant growth. Therefore according to

Παρασκευή 21 Νοεμβρίου 2014

Let's Make HTTPS the Standard and not the Exception

On November 18th, EFF announced Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with

Πέμπτη 20 Νοεμβρίου 2014

The Imitation Game: Historical Figures of Cryptanalysis

The Imitation Game was released in the United Kingdom on 14 November 2014, and will be released theatrically in the United States on 28 November 2014. The film portrays the race against time by Alan Turing and his team of code-breakers at...

Τετάρτη 19 Νοεμβρίου 2014

ENISA Set to Establish a Framework for Cyber Security Competitions

Today the European Union Agency for Network and Information Security (ENISA) announced the planning of the 1st pan-European Cyber Security Competition in 2015. The competition is organised jointly in collaboration with experienced organisations from EU Member States for studen...

Τρίτη 18 Νοεμβρίου 2014

Οverview of the advanced persistent threats (APT) in first half of 2014

The Advanced Threat Report for EMEA provides an overview of the advanced persistent threats (APT) targeting computer networks...

Δευτέρα 17 Νοεμβρίου 2014

Fraud Quiz #01

Test your resolve against fraud. Answer 10 questions regarding fraud and scams and post your score at the comments section. It is not a contest so you don't have to be competitive....

Κυριακή 16 Νοεμβρίου 2014

Startups Awarded in Cyber Security & Privacy, by EIT ICT Labs

It is a big challenge to protect security and privacy of enormous amounts of data being collected, processed and stored in the cyber space. Lack of timely technical solutions may put at risk privacy and liberty of citizens and may endanger the growth of ICT-enabled products and services, whereas security breaches can have significant negative impact on people’s lives, jobs and property. The existing gaps between currently available techniques and...

Smartphones, Tablets and Fraud

Consumers rely on their mobile devices on an ever-growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and PII...

Σάββατο 15 Νοεμβρίου 2014

eConference on Mobile Security

SC Magazine UK  is running a Mobile Security eConference on 25th November 2014. Best of all it's FREE! As a cherry on top, if you are a CISSP or SSCP you can get some CPE credi...

Παρασκευή 14 Νοεμβρίου 2014

How does Trust looks like?

A trustmark is a sign displayed on an eCommerce website, it has the purpose to provide an independent guarantee of the trustworthiness and reliability of the websh...

Δευτέρα 10 Νοεμβρίου 2014

Biometrics

The oldest method of authentication and so is largely accepted as a biometric, is signature. There are two subtypes of signature verification systems, static and dynamic. In the later subtype, speed, velocity, pressure, angle of the pen and the number of times the pen is lifted from the pad, is be measured while in static subtype only the image of the signature is used. The dynamic signature verification is more secure and reliable than static signatures....

Κυριακή 9 Νοεμβρίου 2014

Seek and Destroy: Operation WireLurker

WireLurker is a malware that infects computers running Mac OS X or Windows and subsequently spreads via USB connected to iOS devices. In order to be able to do so, the virus installs an enterprise provisioning profile on iOS connected devices....

Σάββατο 8 Νοεμβρίου 2014

International Fraud Awareness Week

InfoSecLeague Joins Movement to Shine a Spotlight on Fraud
International Fraud Awareness Week kicks off Nov. 16, 2014 worldw...

Παρασκευή 7 Νοεμβρίου 2014

Quiz Time #01

Test your wits against others. Answer 15 questions regarding information security and post your score at the comments section. It is not a contest so you don't have to be competitive....

Δευτέρα 3 Νοεμβρίου 2014

New standards for cloud computing

The International Organisation for Standardisation (ISO) has released two new standards for cloud computing, in order to bring order to cha...