Search results

92 items matching your search terms.
Filter the results.
Item type

























































New items since



Sort by relevance · date (newest first) · alphabetically
Future Internet gets boost, courtesy of IPv6!
Use of the IPv6 Internet Protocol has more than doubled in the last year, ensuring that the Internet can continue to meet growing demand from users across the world. The boost comes from IPv6 increasing the number of Internet addresses, enabling more computers and other devices to be connected online.
Located in News / ENISA News
Kroes: European Internet Security Strategy due for Q3/2012
Commissioner Kroes has announced that the European Internet Security Strategy is planned for autumn 2012.
Located in News / ENISA News
Inter-X Study
Located in Topics / / Internet Infrastructure / Internet Interconnections
Report/Study ECMAScript program Smartphone Secure Development Guidelines
This document was produced jointly with the OWASP mobile security project. It is also published as an ENISA deliverable in accordance with our work programme 2011. It is written for developers of smartphone apps as a guide to developing secure apps. It may however also be of interest to project managers of smartphone development projects.
Located in Publications
File Octet Stream «Να συνδέεται κανείς ή να μη συνδέεται;» Έκθεση του οργανισμού ENISA για την κυβερνοασφάλεια σχετικά με τις μελλοντικές επιπτώσεις του «Life-Logging» και των ηλεκτρονικών δεδομένων προσωπικού χαρακτήρα, καθώς και τις επιπτώσεις στο απόρρητο, την οικονομία
Ο ENISA αποπειράται να προβλέψει τις θετικές και αρνητικές επιπτώσεις, για το 2014, του ηλεκτρονικού «life-logging» (η μεταφόρτωση δεδομένων προσωπικού και άλλου χαρακτήρα στο διαδίκτυο) για τους πολίτες και την κοινωνία. Σε μια νέα έκθεση, με τίτλο «Να συνδέεται κανείς ή να μη συνδέεται; Κίνδυνοι και οφέλη από τις αναδυόμενες τεχνολογίες ‘life-logging’», ο Οργανισμός χρησιμοποιεί την καθημερινή ζωή μιας υποθετικής οικογένειας για να εξετάσει τις επιπτώσεις για το απόρρητο, το «πορτοφόλι», την ψυχολογία της οικογένειας, κτλ., καθώς τα μέλη της μεταφορτώνουν όλο και περισσότερες προσωπικές πληροφορίες στο διαδίκτυο. Στην έκθεση περιλαμβάνονται συστάσεις σχετικά με την αντιμετώπιση των κινδύνων για την ασφάλεια και το απόρρητο.
Located in News / ENISA News / PRs in Greek
File PDF document Loggen oder nicht loggen?
Loggen oder nicht loggen?“ Die Agentur für Internetsicherheit ENISA äußert sich zu den zukünftigen Auswirkungen von Life-Logging und ins Internet gestellten persönlichen Daten auf die Privatsphäre, die Wirtschaft, die Gesellschaft und die psychologische Verfassung der Menschen
Located in News / ENISA News / PR's in DE
File PDF document ‘lifelogging’ et de la publication de données personnelles en ligne
«Consigner ou ne pas consigner ?» L’agence de cyber-sécurité ENISA a établi un rapport sur le futur impact du ‘lifelogging’ et de la publication de données personnelles en ligne, examinant leurs répercussions sur la confidentialité, l’économie, la société et la psychologie des individus
Located in News / ENISA News / PR's in FR
Press Release Life-logging & online personal data; the effects on privacy, economy, society & people’s psychology; in new report; “To log or not to log?”
The EU's 'cyber security' agency ENISA reports on future impact of life-logging & online personal data; and the effects on privacy, economy, society and people’s psychology.
Located in News / ENISA News
Report/Study Cyber-bullying and online grooming: helping to protect against the risks
Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular, the risk of become a victim of online grooming and cyber bullying activities. Today’s kids are living in an environment that is radically different from that of their parents; virtual environments are increasingly prevalent in private and education environments. This development is detrimental to their physical activities, social skills and the behavioural model that prevailed in previous generations. ENISA has formed a Working Group consisting of international experts in various disciplines related to the area of children’s online protection. Interdisciplinary knowledge and relevant experience in the area were the criteria of their engagement. During the selection phase of the scenario to be assessed, the expert group has identified cyber bullying and online grooming as an area that requires further elaboration. With this assessment we aim to demonstrate how attacks based on misuse of data (i.e. data mining and profiling) can affect minors. Although the issue of children’s exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors.
Located in Publications
Report/Study Appstore security: 5 lines of defence against malware
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information