Using the CERN e-mail service gives you some flexibility, but some current practices can have severe implications for password secrecy and the confidentiality of certain documents sent by e-mail
Once you are connected to CERN’s wired or wireless networks, you are bound by CERN’s Computing Rules, which requires you to always keep your system up-to-date, fully patched and protected against unauthorised access
In late June, CERN was subjected to a wave of seemingly targeted e-mails containing a potentially malicious PDF or DOC attachment
Here are two new twists – probably still theoretical, but both pointing towards new ways to spy on you by misusing your microphone…
In order to make your digital life as comfortable as possible, here are few useful things to know
“Serious gaming” is the gamification of training for professional purposes. When you play a serious game, you are actually also improving your knowledge on a particular subject
Do you know what drugs and proprietary software have in common? You bear the consequences if the product you buy is of mediocre quality
Running your own computing hardware, installation stack, (web) applications, databases, etc., is just not cost effective and usually you won’t be able to commit the required attention to keeping those systems sufficiently secure
Browsing to the wrong webpage is the second major way of getting your laptop, your account and your data compromised
The mandate of the CERN Computer Security Team is simple: to protect the reputation and operations of the Organization from cyber risks. But this simple sentence can quickly become complex: what is the risk?
While CERN has deployed sophisticated measures in an effort to block malicious e-mails before they even arrive in your inbox, not all of them are filtered out: there might still be some that you can read
Let’s keep our Internet presence secure and professional! Let’s apply New York City methods!