RESEARCH & DEVELOPMENT DEPARTMENT

[VIDEO] CNN Greece and Audax Cybersecurity Investigation on Shadow Brokers

Shadow Brokers: who are the hackers threatening the planet? They are currently the most dangerous hackers on the planet. After the massive attack with the computer capture software, Wannacry, the hackers claim to have a new set of hacking tools and that they are aware of the existence of vulnerabilities in Windows 10.

read more

WannaDecrypt0r - Full analysis of the NSA's super-trick

Friday 12 May 2017. Perhaps the largest and most severe ransomware attack is a fact. The attack was carried out with the malware type "Crypto- Malware", which can affect all versions of operating systems and spread, mainly through emails. The malware encrypts digital files and data on computers, which are released after [...]

read more

Cyber Attack Map - Real visualization of cyber attacks

Visit the website, https://www.audax.gr/cyberattacks/, and see in real time the thousands of hacking attacks that take place every second around the world!

read more

When is the processing of personal data permitted?

EU data protection rules, also known as the "EU General Data Protection Regulation", describe different situations in which businesses or institutions are allowed to collect or reuse information about citizens. In particular, the European Commission sets out five conditions.

read more

Why should I be informed and follow the provisions of the GDPR?

Based on the new regulation: Individuals (consumers, customers, suppliers, suppliers, staff) have increased rights compared to the past, the exercise of which will be a thorn in the side and will distract ill-prepared businesses from their daily routine. The way in which personal data is collected as well as the information provided to individuals is changing. Η [...]

read more

How do we spot a fake Facebook profile?

In the world of the Internet, where electronic media have dominated communication and direct contact is becoming more and more indirect, things tend to change radically and fraud is becoming the dominant phenomenon.
People of all ages have personal accounts on social networks (Twitter, Facebook, LinkedIN, Instagram, Pinterest, etc.) and participate in public blogs and forums [...]

read more

How secure is the Cloud: can we trust it with our personal data?

Living in the so-called digital age, it is known that every person interacts with technological devices in their everyday life. From mobile phones to tablets or computers, everyone makes use of these devices and is now fully familiar with their functions. This familiarity has led to the confidence to store a variety of our personal data [...]

read more

Is the behaviour of Greek blogs that transmit valuable information "intentional" or foolish?

Diplomatic explosion between Greece and Turkey? The menu will include cyber warfare by groups of Turkish hackers attacking Greek state websites, diplomatic and strategic pressure and countless propaganda from the neighbouring country with the clear intention of destroying the morale of the Greek people. I think you all have understood Turkey's game of psychological [...]

read more

Infodemic: Storm of unsubstantiated information about COVID-19

After fake news and disinformation, another concept came along: infodemic. It is a compound word and comes from the words information and epidemic.

read more