Publication

Greetings: Mr.Charles Ponzi

Posted on
An old woman looks suprised when a hand comes out from the computer display and gives money to her. This picture is supposed to describe that if you get an e-main from somebody who wants you to do something to get more money, it use to be a scam and you shoud never aswer to these kind of junkmails.

Centria Bulletin published an article “Junkmail conversations” written by our Cynic-colleague Olli Isohanni: Have you been curious what happens if you reply to junk mail? We at Centria SecuLab have tested it so that you do not need to! There is usually little or no danger in the process of receiving and opening a spam […]

News

Phishing affects us all

Posted on
This attachment opened a somewhat authentic looking Microsoft login page that had the targets email address already filled

An email that contains a link or an attachment is sent to the recipient with the purpose of retrieving data by directing the user to some fake web page on the internet, or by executing a malicious code from an attachment. Phishing campaigns often use the same formula. An email that contains a link or […]

Publication

On the design of playful training material for information security awareness

Posted on

New paper: On the design of playful training material for information security awareness https://doi.org/10.35199/ICDC.2020.30 Researcher from the CYNIC-project presented a paper during The Sixth International Conference on Design Creativity (ICDC2020) Oulu, Finland, August 26th – 28th 2020.   Abstract: This paper presents the rationale for the design of a card deck game sustaining information security […]

News

Rethinking capabilities in information security risk management

Posted on

The latest article in CYNIC-project is now published: Rethinking capabilities in information security risk management: a systematic literature review Abstract: Information security risk management capabilities have predominantly focused on instrumental onsets, while largely ignoring the underlying intentions and knowledge these management practices entail. This article aims to study what capabilities are embedded in information security […]