Category: Computing
-

Computer security: T2U4U2FA* *Thanks to you for using 2FA
One year ago, the CERN Computer Security team and the IT Identity Management team started the CERN-wide roll-out of multifactor authentication to staff and users. The combination of a second “factor”, i.e. something you have, and the primary factor “something you know”1, i.e. your password, provides the ultimate silver bullet for the protection of your
-

Computer Security: Avoiding salmonella in your code
Writing quality software is like preparing an amazing meal for your friends. Quality ingredients. Established utensils. A clean kitchen (at least initially). And regular tasting to avoid giving your friends a disappointment (or salmonella). The same thing applies to coding. Choosing a suitable programming language. Using established software and version management tools. Preparing clean and
-

Computer Security: I know what you did last summer
Just in time for the end of the holiday season and with reference to a famous film of the 90s, we set out to study where you’ve been and what you did this (last) summer… without infringing on your privacy as you’re actually already publishing this information freely. Or, rather, your smartphone is. As discussed





