Blog

Private Data Harvesting on Alexa using Third-Party Skills

Abstract We are currently seeing an increase in the use of voice assistants which are used for various purposes. These assistants have a wide range of inbuilt functionalities with the possibility of installing third-party applications. In this work, we will focus on analyzing and identifying vulnerabilities that are introduced by these third-party applications. In particular, […]

BY Erisa Karafili

Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment

Abstract: Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user-journey approach to model human behavior and visually map SMEs’ practices and threats, along with a visualization of the socio-technical actor-network, targeted specifically […]

BY Costas Boletsis, Ragnhild Halvorsrud, J Brian Pickering, Stephen Phillips and Mike Surridge

The CyberKit4SME brochure

To learn more about the @cyberkit4sme  project, check out our new brochure. Scope, objectives, motivations, and impact, are all there. Please do not hesitate to contact us for further information or to collaborate: cyberkit@cyberkit4sme.eu  Our goal is to provide cyber security tools that help SMEs and MEs become aware of, analyze, forecast, and manage cyber […]

BY Tiberiu Cocias
Next Page »