Cybercrime is a growing global problem that no company or country can tackle alone. At any given time, an estimated 150,000 viruses and other types of malicious code are circulating the internet, infecting more than a million people every day.

Anti-virus software developer McAfee counts 75 million unique pieces of malicious malware code on its databases, with botnets spewing out spam that account for a third of all e-mails sent every day. Bots are one of the most sophisticated and popular types of cybercrime today.

They allow hackers to take control of many computers at a time, and turn them into “zombie” computers, which operate as part of a powerful “botnet” to spread viruses, generate spam, and commit other types of online crime and fraud.

The worldwide cost of cybercrime is estimated at over €750 billion annually in wasted time, lost business opportunities and the expense of fixing problems.

In addition to developing wider cybersecurity strategies for Europe, the European Commission takes concrete actions to tackle cyber security risks and pools resources with national governments, industry, universities and NGOs, to develop innovative technologies to improve cybersecurity.

For the period 2007-2013, the European Commission has spent about €350 million in cyber security research; from 2013 to 2020, €400 million is earmarked to support key enabling and industrial technologies such as cyber security, privacy and trust technologies, and an additional €450 million is earmarked for ‘Secure Societies’ research which includes aspects of cybersecurity.

EU-funded projects address the big issues facing cybersecurity: cost, speed and long-term security; helping to keep computer users one step ahead of the hackers, Trojans (type of malware that masquerade as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorised access to a computer) and viruses plaguing the online world today.

European experts are working to establish Syssec, a European ‘Network of Excellence’ built on the age-old concept that prevention is better than cure. The NoE is focused on developing solutions for predicting threats and vulnerabilities before they occur, enabling potential victims of cyber-attacks to build defences before threats materialise.

The network also identifies roadmaps on research that need to be implemented to reduce threats. The project has set up a virtual centre of excellence empowering collaborative research within the systems-security research community in Europe and is working on cyber-security education initiatives.

Nessos, the Network of Excellence on Engineering Secure Future Internet Software Services and Systems focuses on fostering the design and development of secure software and systems for the future internet. The aim is to ensure engineers and developers address security concerns at the very beginning of system analysis and design.

The need for quick software updates to counter emerging risks means there is less time to do testing and verification. The Secure Change project makes it possible to test only the new parts and maintain the security and integrity of the entire system. In the future internet, users will move away from today’s static services toward mixing and matching components and services depending on availability, quality, and price.

The Aniketos project focuses on bringing security and trust to this heterogeneous environment. In such a world, applications are likely to be composed of multiple services from many different providers. Without a specific effort by policymakers and researchers, the end-user could end up having few ways to guarantee that a particular service or service supplier offers the security they claim.

The Aniketos team, which includes major industrial players and research institutes, develops new technology, tools and security services to counter this possibility.

The TECOM project has helped make embedded computing systems more secure, by adapting technology originally developed for PCs to run on everything from smart phones to smart electricity meters. With cloud computing, data is distributed and instantly accessible from anywhere at any time. Cloud infrastructure also needs to be secure and trustworthy just as much as the applications and services that run on it.

With the goal of building trustworthy clouds, the Tclouds project is focused on achieving a combination of security, privacy and resilience that can be widely applied across cloud services. It thus helps ensure the continued expansion of cloud infrastructure, resources and services for many years to come.

When it comes to securing data, be it in the cloud or on your network server, cryptography plays a major role. Every time you use a credit card, access your bank account online or send a secure e-mail, cryptographic algorithms are running behind the scenes.

As computers become more powerful, network speeds increase and data storage grows, the current methods of protecting information are challenged. The Ecrypt project and its successor Ecrypt-II address these challenges.

Sign up to our free newsletters

Get the best updates straight to your inbox:
Please select at least one mailing list.

You can unsubscribe at any time by clicking the link in the footer of our emails. We use Mailchimp as our marketing platform. By subscribing, you acknowledge that your information will be transferred to Mailchimp for processing.