New Search

If you are not happy with the results below please do another search

14 search results for: Cyberattack

1

When organizations respond to cyberattacks

Cyberattacks are a growing reality that organizations have to face up to. In the framework of the German-French Academy for the Industry of the Future, researchers at IMT and Technische Universität München (TUM) show that there are solutions to this virtual threat. In particular, the ASSET project is studying responses to attacks that target communication […]

2

Bitcoin crash: cybercrime and over-consumption of electricity, the hidden face of cryptocurrency

Donia Trabelsi, Institut Mines-Télécom Business School ; Michel Berne, Institut Mines-Télécom Business School et Sondes Mbarek, Institut Mines-Télécom Business School Wednesday 19 May will be remembered as the day of a major cryptocurrency crash: -20% for  dogecoin, -19% for ethereum, -22% for definity, the supposedly-infinite blockchain that was recently launched with a bang. The best-known of […]

3

Something phishy is going on!

Cyberattacks have been on the rise since the month of March 2020. Hervé Debar, an information systems security researcher at Télécom SudParis, talked to us about the relationship between cyberattacks – such as phishing and zoom-bombing  – and the Covid-19 health crisis.   For some, the crisis brought about by Covid-19 has created opportunities: welcome […]

4

Domain name fraud: is the global internet in danger?

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] [dropcap]I[/dropcap]n late February 2019, the Internet Corporation for Assigned Names and Numbers (ICANN), the organization that manages the IP addresses and domain names used on the web, issued a warning on the risks of systemic Internet attacks. Here is what you need […]

5

SPARTA: defining cybersecurity in Europe

The EU H2020 program is continuing its efforts to establish scientific communities in Europe through the SPARTA project dedicated to cybersecurity. This 3-year project will bring together researchers to take up the new cybersecurity challenges: providing defense against new attacks, offering protection in highly-connected computing environments and artificial intelligence security. Hervé Debar, a researcher in […]

6

Hospitals facing a different kind of infection: computer viruses

Hervé Debar, Télécom SudParis – Institut Mines-Télécom [divider style=”normal” top=”20″ bottom=”20″] [dropcap]W[/dropcap]annaCry was the first case of a cyberattack that had a major effect on hospitals. The increasing digitization of hospitals (like all areas of society) offers significant opportunities for reducing the cost of health care while making the care provided more effective. However, with […]

7

Four flagship measurements of the GDPR for the economy

Patrick Waelbroeck, Professor in Economic Sciences, Télécom ParisTech, Institut Mines-Télécom (IMT) [divider style=”normal” top=”20″ bottom=”20″] [dropcap]N[/dropcap]umerous scandals concerning data theft or misuse that have shaken the media in recent years have highlighted the importance of data protection. The implementation of the General Data Protection Regulation (GDPR) in Europe is designed to do just that through […]

8

TTool offers security, safety and performance for embedded systems

I’MTech is dedicating a series of articles to success stories from research partnerships supported by the Télécom & Société Numérique Carnot Institute (TSN), to which Télécom ParisTech belongs. [divider style=”normal” top=”20″ bottom=”20″] By combining three areas for assisting the design of embedded systems, the TTool platform is seen as a safety net for industry. The […]

9

Cybersecurity: high costs for companies

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] [dropcap]T[/dropcap]he world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ motivations. […]

10

Cyberdefense seeks to regain control

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing valid cyberdefense solutions to help […]