Trainees and employees at Centria University of Applied Sciences Kokkola Campus in FInland.

Welcome trainees!

Posted Posted in News

Today Centria University of Applied Sciences had an introduction day for 6 new enthusiastic trainees. All of them are studying information technology. They will work with different tasks during the summertime. You will also have an opportunity to read about their achievements here in the Sifis-Home website.

Security camera

IP cameras do not necessarily improve security

Posted Posted in Blog

All devices that are connected to the internet are in danger of being accessed by unknown and potentially malicious third parties. In the case of poorly protected internet-facing cameras, threat actors can in the worst case access the live feed of the camera, record sensitive data, and also use the camera as an access point […]

ERICyB Cluster, European Research Innovation for Cybersecurity. Under the topic there is H2020-project logos, Assure, Cyrene, Fishy, Bieco, Sancus, IoTAC, and Sifis-Home. On the left side it is written Barcelona Cybersecurity COngress 31st January - 2nd February. Barcelona - Gran via venue hall 4. Visit us at stand C350

Press release: EU H2020 Research and Innovation projects demonstrate their research results at the Barcelona Cybersecurity Congress

Posted Posted in News

27th January, 2023 The European Research Innovation for Cybersecurity (ERICyB cluster) is proud to announce that seven of its projects will be jointly exhibiting at the Barcelona Cybersecurity Congress, taking place between January 31st and February 2nd, 2023. This congress is co-located with the IoT Solutions World Congress, which is the leading IoT congress and […]

In this picture a man is holding a magnifying glass in front of his face. And the magnifier is showing a digital picture of some kind of head.

We’re Entering the Age of Deepfakes

Posted Posted in Blog

Fake videos generated by Artificial Intelligence (AI) are more and more convincing. If you have seen Barack Obama call Donald Trump a “complete dipshit” (BuzzFeedVideo 2018), or Mark Zuckerberg brag about having “total control of billions of people’s stolen data” (Yaeger 2019), then you have seen a deepfake. They use a form of AI called […]

In this picture, there is a virtual meeting room with five virtual persons sitting around a table

The metaverse brings new cyber risks

Posted Posted in Blog

The gap between the physical and the cyber world is narrowing down, and we are spending more and more time in the artificial universe. One of the most exciting new hypes is the metaverse. It is a term that is used to describe a combination of the virtual reality and mixed reality worlds, that is […]

Smartwatch on a wrist.

Is there a risk on your wrist?

Posted Posted in Blog

People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]

Sifis-Home project consortium standing outside in beautiful Torino 2022.

First physical plenary meeting in Turin Italy

Posted Posted in News

The first physical plenary meeting of the SIFIS-Home project consortium took place last week as finally the partners were able to meet in beautiful Turin, Italy. Partners who were not able to join physically, joined the plenary meeting virtually. The main agenda of the consortium meeting was to prepare for the mid-term review taking place […]

People together with a yellow lock. The lock is a symbol of sedurity.

Developing open standards provides benefits to security standards

Posted Posted in Blog

Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]