Tag: Computer Security

  • Computer Security: PhishMS

    Clicking on the wrong malicious link or attachment, or disclosing your password in reply to a malicious email or on a fake and nasty CERN single sign-on page, are two major attack vectors for the evil side to infiltrate CERN

    Explore →

  • Computer Security: Vigilance and calmness

    Malicious actors are taking advantage of the current global political situation to pursue their criminal deeds

    Explore →

  • Computer Security: Time for a spring clean

    Spring has arrived and we would like to encourage you to use your freshly gained energy to review your digital resources

    Explore →

  • Computer Security: Supply chain time bombs

    Approximately five CERN-registered companies fell victim to a ransomware or extortion attack every single month

    Explore →

  • Computer security: Unwanted presents

    Last year ended with a nasty surprise for the computer security community in particular and the IT community more generally…

    Explore →

  • Computer Security: Disaster for your crown jewels

    You, as a CERN service manager, data taker, control system expert, trigger master, software custodian or document librarian, have a professional responsibility to ensure that your crown jewels are properly protected and backed up

    Explore →

  • Computer Security: A new bonbon to protect you

    With the new firewall in place (“Block the bad, grant the good access”) in addition to our dedicated malware-quarantining appliance that has been running smoothly for some years, it’s time for strike number three: the deployment of new anti-virus, anti-malware and endpoint detection and response software running on Windows and Mac computers. Our bonbon for

    Explore →

  • Computer Security: Kill that horse

    This summer, various security outfits reported on a particular nasty kind of spyware found installed on iPhone devices. Dubbed “Pegasus”, this malware is thought to be designed by a shady security company and sold to governments and others in order to spy on journalists, activists and even politicians (like the French President). An estimated 50

    Explore →

  • Computer Security: Privacy vs security – a double dilemma

    In this increasingly digitalised world, privacy was initially neglected for some time, but is now gathering speed. The internet was the no-privacy Wild West, with big social media outlets, advertising companies and government agencies trying to gather whatever was legally (and sometimes even illegally) possible. People, however, are becoming more and more aware of the

    Explore →

  • Computer Security: STOP Spam!

    Some ideas to identify sophisticated spam

    Explore →