Cyber-attacks are quite common nowadays: data breaches, malware, botnets, phishing are some of the (buzz)words we hear almost constantly in the media. While these attacks were once carried out by “white hat” hackers, whose purpose was to bypass security systems as a hobby or intellectual challenge, now they are performed mostly by criminals, with the aim of making profit.
The latest issue of the Spanish journal Economía3 includes a short article (in Spanish) by S2’s Miguel Juan. The author reflects on the increasing use of smartphones, both in the personal and work environments, and the security risks this poses. In particular, BYOD and COPE trends are discussed.
KU Leuven’s Damian Clifford and Yung Shin Van Der Sype presented their full research paper at the IAITL Conference in Lisbon. The IAITL Conference Series is devoted to expanding understanding and developing international relationships among those who are working with issues dealing with information technology economic and public and private law.
The final session of the MUSES plenary meeting was devoted to the discussion of the forthcoming execution of the trials of Prototype #1, which are foreseen to start by the end of 2014 – early 2015.
A number of issues were raised covering different areas, mainly Goal and Metric definition (following the GQM methodology), trial set up and user interaction and the legal aspects involved.
The plenary session was devoted to review the developments in the project in its second year and plan ahead for Year 3, which started yesterday.
There were presentations and a demo on Prototype #1, and on the latest techniques for rule learning, risk and opportunity handling, situation prediction and persuasive systems, as well as the legal aspects related to corporate security policies.