RESEARCH & DEVELOPMENT DEPARTMENT

Cyber fraud: The law is changing so that banks can refund money to victims

The implementation of the actions recently decided between banks, the State, the Bank of Greece, and the Hellenic Police to combat the phenomenon, which has experienced significant growth internationally and in Greece, continues. This is happening simultaneously with the explosive rise of digital transactions in recent years. Regarding the next steps, their central strategy is to maintain the...

read more

Έρευνα για την Infosolutions

Στην Ελλάδα του 2015 με τρομάζει το γεγονός ότι μια εταιρία-φάντασμα όπως αποδεικνύεται η Infosolutions διατηρούσε συμβόλαιο κυβερνοασφάλειας του Πρωθυπουργικού γραφείου επί διακυβερνήσεως κ. Αντώνη Σαμαρά και ήθελε να διαχειριστεί δεδομένα πολιτών στις εσωκομματικές εκλογές της ΝΔ. Αξίζει εδώ να σημειωθεί πώς μερικές ιστοσελίδες και μπλόγκ αναφέρουν δύο ονόματα σχετικά με την εν λόγω εταιρία. […]

read more

Internet of Things or Internet of Threats

Article by Mr. Theofanis Kasimis published in the IT Security magazine. Internet of Things or Internet of Threats? The Internet of Things will soon become the largest source of attacks on companies, as the number of connected devices is expected to reach between 20 billion and 50 billion units by 2020. Gartner predicts that by [...]

read more

More than two out of three small and medium enterprises have a false sense of security

Despite the lack of resources and funding, small and medium-sized enterprises achieve significant efficiency by utilizing applications for project management, sales, and customer service. However, with customer data being a crucial element of these solutions, do businesses effectively secure it from constantly evolving digital threats? According to the report by Kaspersky Lab, the [...].

read more

The symbols of pedophiles

The symbols of pedophiles According to the 7th chapter of the "Handbook for Pedophiles," which includes a "Code" of communication among them, discovered on the "dark web" following targeted investigations, members of pedophilic "organizations" use various types of symbols and logos to recognize each other. In this way, they make themselves known to...

read more

New Turkish hacker operation called “Hedefimiz Gyranas Bilginize” underway…

A new operation has been launched against the information systems of Greece in the past few hours, resulting in over 100+ highly significant Greek websites being targeted. The group behind this operation is called Ayyildiz Tim. Ayyıldız Tim is one of the oldest hacking groups in Turkey, known for its organization, hierarchy, and activities.

read more

[RESEARCH] Why are the profiles of Greek showbiz celebrities hacked?

In recent days, there has been intense activity by hackers targeting the profiles of Greek showbiz personalities on all social media platforms where they have accounts, aiming to invade them. Several celebrities from the showbiz industry have visited our company's offices and informed us that their profiles have fallen victim to hackers, and they...

read more

[Blue Whale Research] Spotify, jailbroken smartphones, suicide orders and Russian facebook

Audax Cybersecurity research on the test called "Blue Whale Challenge - Blue Whale Test. What is the "game" of suicide? The Blue Whale Challenge consists of 50 challenges that take place over a period of 50 days. It starts with simple steps asking participants to draw an animal, wake up late in the morning and [...]

read more

[VIDEO] CNN Greece and Audax Cybersecurity Investigation on Shadow Brokers

Shadow Brokers: who are the hackers threatening the planet? They are currently the most dangerous hackers on the planet. After the massive attack with the computer capture software, Wannacry, the hackers claim to have a new set of hacking tools and that they are aware of the existence of vulnerabilities in Windows 10.

read more

WannaDecrypt0r - Full analysis of the NSA's super-trick

Friday 12 May 2017. Perhaps the largest and most severe ransomware attack is a fact. The attack was carried out with the malware type "Crypto- Malware", which can affect all versions of operating systems and spread, mainly through emails. The malware encrypts digital files and data on computers, which are released after [...]

read more