Category: Computing

  • Computer Security: Wrong link, wrong login, and BOOM

    Computer Security: Wrong link, wrong login, and BOOM

    Clicking on a malicious link or attachment, or disclosing your password in reply to a malignant email or on a fake and nasty CERN Single Sign-On page, are two major attack vectors for the evil side to infiltrate CERN

    Explore →

  • Computer Security: Catch me if you can

    The Zebra Scientific Alliance has been compromised; hit hard by an attacker. Zebra’s IT experts and computer emergency response teams are on the prowl, trying to get to the bottom of the malicious deeds

    Explore →

  • Computer Security: Spot the difference?

    Computer Security: Spot the difference?

    We have repeatedly published articles on “phishing” and the risks when browsing the web or opening emails. STOP – THINK – DON’T CLICK is still the mantra to follow

    Explore →

  • Computer Security: Log in. Click. Be secure

    The ultimate silver bullet to protect your account, computer and data is using a sufficiently complex and unique password combined with a second-factor token

    Explore →

  • Building work for CERN’s new data centre in Prévessin begins

    Building work for CERN’s new data centre in Prévessin begins

    On Friday, 22 April, a ceremony was held to mark the beginning of construction of CERN’s new energy-efficient data centre

    Explore →

  • Computer Security: Email equals letters

    When receiving an email, please don’t rely on the supposed sender. Rely on the overall package

    Explore →

  • Research and industry unite at 2022 CERN openlab Technical Workshop

    Research and industry unite at 2022 CERN openlab Technical Workshop

    CERN openlab brings together IT experts from research and industry to address the computing challenges posed by the LHC’s ambitious upgrade programme

    Explore →

  • Computer Security: PhishMS

    Clicking on the wrong malicious link or attachment, or disclosing your password in reply to a malicious email or on a fake and nasty CERN single sign-on page, are two major attack vectors for the evil side to infiltrate CERN

    Explore →

  • Computer Security: Vigilance and calmness

    Malicious actors are taking advantage of the current global political situation to pursue their criminal deeds

    Explore →

  • Computer Security: Time for a spring clean

    Spring has arrived and we would like to encourage you to use your freshly gained energy to review your digital resources

    Explore →