Computer Security team

131 results

Computer Security: The risk of losing it all…

News
Computing
30 September, 2021
Computing
News
30 September, 2021

Computer security: Kill that horse

News
At CERN
16 September, 2021
At CERN
News
16 September, 2021

Computer Security: “Check me” comes before “Scan me”

Like with any other malicious URL, letting one malicious QR code through can put your digital life at risk

News
Computing
12 August, 2021

Computer Security: AndroCovid

Once more, in order to protect yourself, your assets, your private and, consequently, also your professional life: STOP – THINK – DON’T CLICK! Be vigilant and suspicious

News
Computing
21 July, 2021
Computing
News
21 July, 2021

Computer Security: Reflections on paying ransom

Paying is the easiest way to eventually recover the data and re-establish compromised computing services, but hold on...

News
Computing
09 July, 2021

Computer Security: Dear summer students, welcome!

In order to make your digital life as comfortable as possible, there are a few things you need to know

News
Computing
25 June, 2021

Computer Security: The truth lies in the URL

Like last year, every CERN staff member and user received a fake message posing as a malicious attempt to convince them to click on the embedded link...

News
Computing
10 June, 2021

Computer Security: Block the bad, grant the good access

Adhering to network protocol standards, any outgoing traffic initiated from the so-called “lower ports”, i.e. ports 0-1023 or using so-called “private” or “non-routable” IP addresses will be blocked

News
Computing
28 May, 2021

Computer Security: What do accelerators and pipelines have in common?

Ransomware attacks against enterprises and academia are not a new phenomenon...

News
Computing
13 May, 2021

Computer Security: About risks and threats

The cyber-risks can be split into four categories: operational, financial, legal and reputational

News
Computing
29 April, 2021
Computing
News
29 April, 2021

Computer Security: Fancy dinner or burned pie?

Relying on external software packages comes with a risk. Successful attack scenarios have been executed in the past

News
Computing
15 April, 2021