Search results

640 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
File ECMAScript program 1. ENISA-Securing Europe's IoT Devices and Services
Located in Events / ENISA Workshop on Cyber security for IoT in Smart Home Environments
File Pascal source code 2. ENISA-IoT Validation Workshop
Located in Events / ENISA Workshop on Cyber security for IoT in Smart Home Environments
File 4. Andrei Costin-SmartHomeSecurity-Workshop-Berlin-20151006
Located in Events / ENISA Workshop on Cyber security for IoT in Smart Home Environments
File 5. OTA - Working Group Overview - 10-5v1
Located in Events / ENISA Workshop on Cyber security for IoT in Smart Home Environments
ENISA Workshop on Cyber security for IoT in Smart Home Environments
Located in Events
File Adequate and effective cybersecurity: state of play
Speech by ENISA’s Executive director, prof. Dr. Udo Helmbrecht – Cybersecurity Conference organised by the Austrian Presidency of the Council of the European Union.
Located in Publications / ED's speeches
Report/Study Flash note: Risks of using discontinued software
ENISA warns about the risks of using discontinued software, not only because of the lack of support from the manufacturer, but also from third parties, like manufacturers of anti-malware or other kind of software, or computer peripherals. This will lead in persistent exposure to vulnerabilities and lack of possibility to update peripherals or third party applications.
Located in Publications / Cyber security info notes
Report/Study Troff document Flash Note: Large scale UDP attacks - the 2014 trend and how to face it
Recent news show the increase of large scale attacks exploiting specific vulnerabilities of the Internet core protocols. In the latest cases, the Network Time Protocol (NTP), which allows synchronizing devices to the coordinated universal time (UTC), has been misused. Specifically, in December 2013, a vulnerability in this UDP protocol became mainstream and started to be exploited for large scale reflection attacks leading to a dramatic increase of the size of denial of services. Luckily, network providers can already put in place a series of known countermeasures to mitigate these threats, as ENISA underlined also for amplification attacks in April 2013.
Located in Publications / Cyber security info notes
Report/Study Flash Note: Heartbleed - A wake-up call
Last week the entire web discovered the existence of the so called “Heartbleed” vulnerability affecting one of the most popular mechanisms used to secure communication with web sites: OpenSSL. The underlying problem is a programming error with fatal consequences. The technical background is analysed by ENISA in a new flash note.
Located in Publications / Cyber security info notes
Report/Study Flash Note: The BASH Shellshock Bug
Last week a serious, remotely exploitable vulnerability was discovered in the widely deployed Bourne Again Shell (BASH). The technical background is analysed by ENISA in a new flash note.
Located in Publications / Cyber security info notes

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information