RESEARCH & DEVELOPMENT DEPARTMENT

More than two out of three small and medium enterprises have a false sense of security

Despite the lack of resources and funding, small and medium-sized enterprises achieve significant efficiency by utilizing applications for project management, sales, and customer service. However, with customer data being a crucial element of these solutions, do businesses effectively secure it from constantly evolving digital threats? According to the report by Kaspersky Lab, the [...].

read more

The symbols of pedophiles

The symbols of pedophiles According to the 7th chapter of the "Handbook for Pedophiles," which includes a "Code" of communication among them, discovered on the "dark web" following targeted investigations, members of pedophilic "organizations" use various types of symbols and logos to recognize each other. In this way, they make themselves known to...

read more

New Turkish hacker operation called “Hedefimiz Gyranas Bilginize” underway…

A new operation has been launched against the information systems of Greece in the past few hours, resulting in over 100+ highly significant Greek websites being targeted. The group behind this operation is called Ayyildiz Tim. Ayyıldız Tim is one of the oldest hacking groups in Turkey, known for its organization, hierarchy, and activities.

read more

[RESEARCH] Why are the profiles of Greek showbiz celebrities hacked?

In recent days, there has been intense activity by hackers targeting the profiles of Greek showbiz personalities on all social media platforms where they have accounts, aiming to invade them. Several celebrities from the showbiz industry have visited our company's offices and informed us that their profiles have fallen victim to hackers, and they...

read more

[Blue Whale Research] Spotify, jailbroken smartphones, suicide orders and Russian facebook

Audax Cybersecurity research on the test called "Blue Whale Challenge - Blue Whale Test. What is the "game" of suicide? The Blue Whale Challenge consists of 50 challenges that take place over a period of 50 days. It starts with simple steps asking participants to draw an animal, wake up late in the morning and [...]

read more

[VIDEO] CNN Greece and Audax Cybersecurity Investigation on Shadow Brokers

Shadow Brokers: who are the hackers threatening the planet? They are currently the most dangerous hackers on the planet. After the massive attack with the computer capture software, Wannacry, the hackers claim to have a new set of hacking tools and that they are aware of the existence of vulnerabilities in Windows 10.

read more

WannaDecrypt0r - Full analysis of the NSA's super-trick

Friday 12 May 2017. Perhaps the largest and most severe ransomware attack is a fact. The attack was carried out with the malware type "Crypto- Malware", which can affect all versions of operating systems and spread, mainly through emails. The malware encrypts digital files and data on computers, which are released after [...]

read more

Cyber Attack Map - Real visualization of cyber attacks

Visit the website, https://www.audax.gr/cyberattacks/, and see in real time the thousands of hacking attacks that take place every second around the world!

read more

When is the processing of personal data permitted?

EU data protection rules, also known as the "EU General Data Protection Regulation", describe different situations in which businesses or institutions are allowed to collect or reuse information about citizens. In particular, the European Commission sets out five conditions.

read more

Why should I be informed and follow the provisions of the GDPR?

Based on the new regulation: Individuals (consumers, customers, suppliers, suppliers, staff) have increased rights compared to the past, the exercise of which will be a thorn in the side and will distract ill-prepared businesses from their daily routine. The way in which personal data is collected as well as the information provided to individuals is changing. Η [...]

read more