Cyber-attacks were a key feature of the 2008 Russo-Georgian war; they affected websites of news agencies, the Georgian President and were implicated in the...
Tag - BecomeACyberHero
By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to configure on...
The primary objective of the LITNET CERT, the Computer Emergency Response Team of the LITNET networks is to tackle security incidents, but it is also fully...
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys, certificates...
By Carolina Fernandez, Jordi Guijarro and Shuaib Siddiqui, i2cat Foundation Introduction of IdP environment in the context of identity security eduGAIN...
By Andrea Pinzani, IT security expert at the Consortium GARR On average, each of us owns from 20 to 40 accounts. Unfortunately, however, we are not very good...
The use of password managers is increasing. No surprise, as they simplify password security and are user friendly. Why do you need one and what are the...
To be effective, passwords need to be long, complicated and unique. It’s also a good idea to have a separate password for every account. But don’t worry...
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to...
By Francesco Palmieri, professor of Computer Science at the University of Salerno Ransomware, considered today an important emergency from the cyber security...
In May 2019, the University of Duisburg-Essen (UDE) was able to prevent a ransomware attack just in time. For the Cyber Security Month 2020 initiative, GÉANT...
On 23 December last year, Maastricht University (UM) was hit by a major ransomware attack. The hackers executed a command installing ‘Clop’...
On 23 December last year, Maastricht University (UM), which is connected to the Dutch education and research network SURFnet, was hit by a major ransomware...
By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been...
SI-CERT, the national CSIRT of Slovenia has been handling reports of ransomware attacks on a regular basis since April 2012. Until 2019, attack victims were...
By Avinash Singh and Hein Venter, Department of Computer Science at the University of Pretoria Ransomware is one of the most destructive forms of malware which...
Ransomware is used by cyber criminals to block you from accessing your data and hold it ‘hostage’ until you pay the ransom. How does it work and how to avoid...
The CIRT of the Faculty Computer Science of the University of Skopje was founded 2.5 years ago as the result of a cybersecurity exercise which brought to light...
By Nicla Ivana Diomede, Chief Information Security Officer at the University of Milan What is Phishing? Phishing is a type of fraud aimed at illegally stealing...