The use of password managers is increasing. No surprise, as they simplify password security and are user friendly. Why do you need one and what are the...
Tag - GARR
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to...
By Francesco Palmieri, professor of Computer Science at the University of Salerno Ransomware, considered today an important emergency from the cyber security...
By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been...
By Nicla Ivana Diomede, Chief Information Security Officer at the University of Milan What is Phishing? Phishing is a type of fraud aimed at illegally stealing...
By Maria Sole Scollo, IT security expert at Consortium GARR Even if phishing has been for many years now a well-known illegal practice, asking people for their...
By Roberto Cecchini (INFN – GARR) What is phishing? Phishing is one of the many social engineering techniques used to deceive users. It is a type of...
By Francesco Ficarola, Università La Sapienza, Rome Warning: picture ahead showing animal in distress If you are reading this, then chances are that you have...
By Simona Venuti, security manager at the GARR-CERT ‘When it’s time to talk about social engineering it’s difficult for me to decide from...
By Silvia Arezzini, systems engineer and project manager at INFN (Italian National Institute for Nuclear Physics) “The problem of social engineering has...
When 17th century composers created music to be performed in St. Mark’s Basilica in Venice, little did they realise that their ground-breaking musical...
Knowledge sharing on the uses of cloud platforms in the research and education environment was the purpose of a two-day workshop organised by the EU-funded...