By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to configure on...
Tag - cyber security
The primary objective of the LITNET CERT, the Computer Emergency Response Team of the LITNET networks is to tackle security incidents, but it is also fully...
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys, certificates...
By Carolina Fernandez, Jordi Guijarro and Shuaib Siddiqui, i2cat Foundation Introduction of IdP environment in the context of identity security eduGAIN...
To be effective, passwords need to be long, complicated and unique. It’s also a good idea to have a separate password for every account. But don’t worry...
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to...
By Francesco Palmieri, professor of Computer Science at the University of Salerno Ransomware, considered today an important emergency from the cyber security...
On 23 December last year, Maastricht University (UM) was hit by a major ransomware attack. The hackers executed a command installing ‘Clop’...
On 23 December last year, Maastricht University (UM), which is connected to the Dutch education and research network SURFnet, was hit by a major ransomware...
By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been...
SI-CERT, the national CSIRT of Slovenia has been handling reports of ransomware attacks on a regular basis since April 2012. Until 2019, attack victims were...
By Avinash Singh and Hein Venter, Department of Computer Science at the University of Pretoria Ransomware is one of the most destructive forms of malware which...
Ransomware is used by cyber criminals to block you from accessing your data and hold it ‘hostage’ until you pay the ransom. How does it work and how to avoid...
The CIRT of the Faculty Computer Science of the University of Skopje was founded 2.5 years ago as the result of a cybersecurity exercise which brought to light...
By Nicla Ivana Diomede, Chief Information Security Officer at the University of Milan What is Phishing? Phishing is a type of fraud aimed at illegally stealing...
By Sonja Filiposka and Anastas Mishev, respectively head and former head of FINKI CIRT Nowadays phishing attacks are one of the most notorious and dangerous...
By Maria Sole Scollo, IT security expert at Consortium GARR Even if phishing has been for many years now a well-known illegal practice, asking people for their...
Continues from Demystiphying phishing – Part 1 By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) Phishing aims to steal your secrets...
By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) On the list of the many issues inflicted by emails, phishing appears to be social disease:...