Just like on the envelope of a normal hand-written letter, any sender address can be specified. “CERN.CH” can easily be spoofed so that an e-mail looks like it comes from someone at CERN, but actually doesn’t
If you take advantage of the plethora of software snippets, code excerpts, libraries and the like circulating on the Internet, don’t forget that there’s a risk: is the code safe? Bug-free? Maintained? And free of any malicious components?
For the protection of your digital assets, photos, films, documents, banking access, social media, etc., make sure that you apply cyber-security best practices
Using the CERN e-mail service gives you some flexibility, but some current practices can have severe implications for password secrecy and the confidentiality of certain documents sent by e-mail
Once you are connected to CERN’s wired or wireless networks, you are bound by CERN’s Computing Rules, which requires you to always keep your system up-to-date, fully patched and protected against unauthorised access
Artificial intelligence raises a host of ethical questions. Vivek Nallur of University College Dublin will give an overview of these on 21 August