Tag: Computer Security
-
Computer Security: PhishMS
Clicking on the wrong malicious link or attachment, or disclosing your password in reply to a malicious email or on a fake and nasty CERN single sign-on page, are two major attack vectors for the evil side to infiltrate CERN
-
Computer Security: Vigilance and calmness
Malicious actors are taking advantage of the current global political situation to pursue their criminal deeds
-
Computer Security: Time for a spring clean
Spring has arrived and we would like to encourage you to use your freshly gained energy to review your digital resources
-
Computer Security: Supply chain time bombs
Approximately five CERN-registered companies fell victim to a ransomware or extortion attack every single month
-
Computer security: Unwanted presents
Last year ended with a nasty surprise for the computer security community in particular and the IT community more generally…
-
Computer Security: Disaster for your crown jewels
You, as a CERN service manager, data taker, control system expert, trigger master, software custodian or document librarian, have a professional responsibility to ensure that your crown jewels are properly protected and backed up
-
Computer Security: A new bonbon to protect you
With the new firewall in place (“Block the bad, grant the good access”) in addition to our dedicated malware-quarantining appliance that has been running smoothly for some years, it’s time for strike number three: the deployment of new anti-virus, anti-malware and endpoint detection and response software running on Windows and Mac computers. Our bonbon for
-
Computer Security: Kill that horse
This summer, various security outfits reported on a particular nasty kind of spyware found installed on iPhone devices. Dubbed “Pegasus”, this malware is thought to be designed by a shady security company and sold to governments and others in order to spy on journalists, activists and even politicians (like the French President). An estimated 50
-
Computer Security: Privacy vs security – a double dilemma
In this increasingly digitalised world, privacy was initially neglected for some time, but is now gathering speed. The internet was the no-privacy Wild West, with big social media outlets, advertising companies and government agencies trying to gather whatever was legally (and sometimes even illegally) possible. People, however, are becoming more and more aware of the
-
Computer Security: STOP Spam!
Some ideas to identify sophisticated spam