What do a video of flying cherubs, a burned $95.000 Banksy artwork and digital kittens have in common? A three-letter acronym: NFT. NFT stands for non-fungible-tokens and it’s the latest phenomenon that it’s taking over the Internet. Non-fungible means one-of-a-kind, unique, that cannot be replaced. Some people say that NFT can be considered as “digital... Continue Reading →
Enablers of the future of Fintechs: Cloud
Introduction There is a battle in the financial sector that is not related to market supremacy but to the protection of IT assets and customer data. Nowadays, Cyber attacks are unfortunately around the corner and some examples are the Capital One data breach of July 2019 and the 2018 attack on HSBC. Every day millions... Continue Reading →
Proxy 101
What is a proxy? A proxy is an entity that is located in between the client (you) and the server (the website you want to access) and allows you to safely surf the web. It connects on your behalf to a given website. How does it work? For example, when you want to access a... Continue Reading →
How are developing countries doing in the cybersecurity field?
If we are asked to identify the most advanced countries in the topic of cybersecurity, our minds go straight to industrialized countries. However, among the list of countries with the best cybersecurity, we can surprisingly find many developing countries too. According to the International Monetary Fund (IMF), developing economies are those with a gross national... Continue Reading →
WhatsApp END to END encryption Explained
Are your WhatsApp chats secure? If you live outside of the U.S., you likely already asked yourself that question. In fact, as of 2020, WhatsApp has reached two billion users worldwide, effectively being the global leading messaging app. Time and time again, WhatsApp claimed that its platform is secure thanks to end-to-end encryption guaranteeing that... Continue Reading →
Why should a company take out a cyber insurance policy?
Companies are increasingly relying on hardware and software components in order to create new business opportunities, to stay competitive in the markets or to be compliant with laws and regulations, and during the information age we are living in, companies are able to collect incredible amounts of data, continuously extracting information, allowing collaboration around the... Continue Reading →
Spoofing Explained
How I Met Your Mother Have you ever watched the episode entitled “The Playbook” (05x08) of How I met your Mother? If you haven’t, you are missing twenty-four minutes of entertainment. And if you have, well, you do have a concrete representation of what spoofing looks like. Spoofing is the action of pretending to be... Continue Reading →
Do you need a VPN?
Do you need a VPN? VPNs (Virtual Private Networks) are mostly used in corporate settings to avoid spending on creating a private protected network, but lately many private consumers have been adopting these tools to secure their connections. The question is: do you really need one? How does a VPN work? When connecting to a... Continue Reading →
Why do we need a student association for cyber security?
What is Cyber security? What are the risks that can emerge from a low level of IT security? But most importantly, why do we need a student association for Cyber security? Find the answer to all these questions in our first report! Two weeks ago, our University was attacked by a group of hackers. In... Continue Reading →