Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →
An overview of Conti and the Ransomware-as-a-Service (RaaS) industry
During the past two years, it seems that Conti, a Russian-based cybercriminal organization, has been imposed as one of the most profitable in the entire Ransomware-as-a-Service (RaaS) ecosystem. Chainalysis estimates that the cyber gang grossed the largest profits in 2021 in the RaaS industry: $180 million extorted. In Europe alone, according to cyber criminals' online... Continue Reading →
CRYPTOGRAPHY, ENCRYPTION AND ENCODING: LET US TACKLE THE MISUNDERSTANDINGS
Cyber-Taxonomy In order to clarify ideas, we shall start from the formal definition of these three fundamental components of Cybersecurity. The term cryptography came about during the 1650s with the meaning of “art of writing in secret characters” from Modern Latin. Encryption, instead, stands for the process used to convert simple readable data known as... Continue Reading →
NVIDIA UNDER ATTACK – DATA BREACH AND MAJOR CONSEQUENCES
Nvidia, one of the largest microchip companies, has been hacked by a group of hackers called Lapsus$. The company became aware of the data breach on February 23rd, the hackers stole employees’ credentials, schemes of GPUs, source code of various firmware, drivers, and proprietary Nvidia software, the total amount of data stolen is about 1... Continue Reading →
A LONG LASTING CYBERWAR AGAINST UKRAINE
The whole world is currently following closely what is happening in Ukraine since February 24th, which is most understandable given the seriousness of the events. Together with the military actions, several specialists and newspapers raised the implication of cyberspace in the war being waged. Contrary to what this growing interest in the cyber contribution seems... Continue Reading →
Spoofing Explained
How I Met Your Mother Have you ever watched the episode entitled “The Playbook” (05x08) of How I met your Mother? If you haven’t, you are missing twenty-four minutes of entertainment. And if you have, well, you do have a concrete representation of what spoofing looks like. Spoofing is the action of pretending to be... Continue Reading →
Why do we need a student association for cyber security?
What is Cyber security? What are the risks that can emerge from a low level of IT security? But most importantly, why do we need a student association for Cyber security? Find the answer to all these questions in our first report! Two weeks ago, our University was attacked by a group of hackers. In... Continue Reading →