Just like on the envelope of a normal hand-written letter, any sender address can be specified. “CERN.CH” can easily be spoofed so that an e-mail looks like it comes from someone at CERN, but actually doesn’t
If you take advantage of the plethora of software snippets, code excerpts, libraries and the like circulating on the Internet, don’t forget that there’s a risk: is the code safe? Bug-free? Maintained? And free of any malicious components?
For the protection of your digital assets, photos, films, documents, banking access, social media, etc., make sure that you apply cyber-security best practices