Obfuscation in the Android ecosystem

Modifying a software application to make it harder to analyse is a task that has been done for years. One common goal is hiding Intellectual Property (IP) that is embedded in the code, and also licensing algorithms or program’s logic. Software protection techniques are also used by threat actors to hide malicious behavior in malware. The term obfuscation is typically used to refer to such modifications.

Harnessing the power of information sharing

Information sharing plays a pivotal role in the realm of cybersecurity due to the dynamic and sophisticated nature of the cyber threats. It entails the exchange of intelligence, insights, and knowledge about cyber threats, vulnerabilities, and defensive measures among organisations, government agencies, security researchers, and relevant stakeholders.

Unlocking innovation in financial services: ABI Lab’s journey in TRUST aWARE and beyond

ABI Lab, the Research and Innovation Centre, promoted by the Italian Banking Association (ABI), plays a pivotal role in fostering collaboration between banks and ICT companies to strengthen the efficiency of financial services. Their expertise spans across areas such as Digital Transformation, Fintech, Blockchain/DLT, Cybersecurity, AI, IT&Operations, and Sustainable Banking Transition.
In our interview, we explore their role within the TRUST aWARE project, their contributions to the development of the Security & Privacy Cyber Threat Intelligence (S&P CTI) platform, and the expected benefits of this innovative solution. We also delve into the biggest challenges facing cybersecurity research today and their vision for the evolving cybersecurity landscape.

Data protection and security as important issues in education

The educational progression, specifically the challenges of more data protection and security tools, has led to the emergence to explore these issues. Our effort tries to define data protection and security as important issues in education and focuses on a popular subarea of it, namely “digital data protection”. In recent years, there has been a rise of concern in using digital tools in education. While there are a lot of potential advantages to adopting digital tools to improve education, there are also big obstacles to overcome. Digital technology must be used in a way that is open, just, and equitable.

Empowering citizens through technology: Cibervoluntarios’ role in TRUST aWARE project

In this interview, we have the pleasure of speaking with our TRUST aWARE partners, Ángel Sola and Andrés del Álamo from Cibervoluntarios, a Spanish non-profit organisation dedicated to promoting social innovation and digital volunteering. Cibervoluntarios has been striving to connect people, organisations, and causes in need through digital tools and technology. With a team of over 2,800 volunteers and partnerships with various institutions, the organisation has impacted thousands of lives in Spain and beyond. In this conversation, we will explore their role in TRUST aWARE, reflect on the challenges of cybersecurity and discuss the role of citizen engagement and digital volunteering in the 21st century.

Protecting our elders online: A conversation with E-Seniors Association on cybersecurity and TRUST aWARE project

In today’s digital age, cybersecurity threats are a growing concern for people of all ages. However, the elderly population is often more vulnerable to these threats due to a lack of familiarity with technology and the Internet. This is where organisations like E-Seniors Association come into play. E-Seniors is a non-profit organisation in France that provides training and support to elderly citizens in using digital tools safely and efficiently. As part of their efforts to address cybersecurity risks for seniors, E-Seniors is partnering with other organisations in the TRUST aWARE project. In this interview, we speak with Anaïs Fernandez and Daria Kyslitska, two project partners from E-Seniors Association to learn more about their role in the project and the trainings they are offering to help prevent cyber attacks against seniors. Keep reading to learn how to create a safer digital world for our elders!

Interview with Juan Tapiador, Universidad Carlos III de Madrid

Juan Tapiador is the leader of the UC3M team at the Department of Computer Science, Universidad Carlos III de Madrid. His team is developing tools to assist with promoting security and privacy analysis of software. Read our interview with him to learn more about what he and his team are working on, their work’s technical elements, and what role TRUST aWARE’s framework plays. Juan also identifies what he sees as the evolving future of cybersecurity; check it out.

Learnings of deploying machine learning models on endpoints via ONNX

Modern approaches to securing the computing infrastructure of organisations against cyberattacks are founded on solutions that monitor all systems in a network simultaneously. This paradigm relies on endpoint sensors – lightweight programs which monitor endpoint activities and collect behavioural events that feed into detection and response systems. In this paradigm, traditional data collection approaches involve streaming all collected events into a cloud backend, where data is then processed and analysed through rules-based detection logic and machine learning models. A complementary approach to this involves placing some detection logic on the sensor itself, closer to the data source. This blog post details WithSecure’s research in TRUST aWARE into using the ONNX framework to port machine learning models and functionality onto endpoint sensors.

Android OS customisations and the accompanying security risks

The research community has exhaustively analysed and put on the spotlight a lot of privacy and security abuses on applications published on mobile app markets like Google Play. However, pre-installed applications have not received so much attention despite their potential for causing security and privacy harm: they are privileged Operating System-level applications. In TRUST aWARE, we are actively developing new methodologies to gain a better understanding of the risks to which end-users can be exposed just by owning an Android handset.

Cybersecurity beyond IT: The human factor and the need for holistic protection – Interview with Microsoft expert Gaia Guadagnoli

Why is it important to involve both a company’s internal and external resources in the protection of cybersecurity? Because attacks will become increasingly sophisticated and evolved and will be linked to delicate geopolitical issues, but also because the human factor plays a crucial role among the elements of vulnerability. Cybersecurity represents an excellent professional opportunity for those beginning their careers, independently from their curriculum of studies. Onelia Onorati Social Media Manager at Fondazione Mondo Digitale interviewed Gaia Guadagnoli, Privacy, Data Protection & Security Technology Specialist at Microsoft Italy and coach of the Course organised as part of Fondazione Mondo Digitale Programme Ambizione Italia for Cybersecurity (March 6-9-13-16)

error: Content is protected !!