By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been...
Tag - CyberSecMonth
SI-CERT, the national CSIRT of Slovenia has been handling reports of ransomware attacks on a regular basis since April 2012. Until 2019, attack victims were...
By Avinash Singh and Hein Venter, Department of Computer Science at the University of Pretoria Ransomware is one of the most destructive forms of malware which...
Ransomware is used by cyber criminals to block you from accessing your data and hold it ‘hostage’ until you pay the ransom. How does it work and how to avoid...
The CIRT of the Faculty Computer Science of the University of Skopje was founded 2.5 years ago as the result of a cybersecurity exercise which brought to light...
By Nicla Ivana Diomede, Chief Information Security Officer at the University of Milan What is Phishing? Phishing is a type of fraud aimed at illegally stealing...
By Sonja Filiposka and Anastas Mishev, respectively head and former head of FINKI CIRT Nowadays phishing attacks are one of the most notorious and dangerous...
By Maria Sole Scollo, IT security expert at Consortium GARR Even if phishing has been for many years now a well-known illegal practice, asking people for their...
Continues from Demystiphying phishing – Part 1 By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) Phishing aims to steal your secrets...
By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) On the list of the many issues inflicted by emails, phishing appears to be social disease:...
By Hendrik Höcke, IT security officer at the Zurich University of the Arts Whether with dynamite or a spear, phishing is a huge challenge for the Zurich...
In the current climate we live in with many of us working remotely or from home, the importance of security awareness has increased drastically. It is known...
In 2020 we cannot doubt the threat posed by phishing; we could spend so much time trying to size the risks for our organisations and society. I am not even...
By Martin Waleczek, DFN-CERT Having an online existence has never been more rewarding. Almost daily someone wins the million dollar jackpot of a lottery and...
By Roberto Cecchini (INFN – GARR) What is phishing? Phishing is one of the many social engineering techniques used to deceive users. It is a type of...
How to recognise phishing? What should you do with phishing mails? And what if you have clicked on a malicious link? Read our tips and tricks below and become...
By Francesco Ficarola, Università La Sapienza, Rome Warning: picture ahead showing animal in distress If you are reading this, then chances are that you have...
By Christine Glaser, Communications and Marketing Manager, Restena Foundation, with the contribution of Jean-Paul Weber, Security Engineer, Restena Foundation ...
By Simona Venuti, security manager at the GARR-CERT ‘When it’s time to talk about social engineering it’s difficult for me to decide from...
By Silvia Arezzini, systems engineer and project manager at INFN (Italian National Institute for Nuclear Physics) “The problem of social engineering has...