News
News
Computer Security: Reflections on paying ransom
Paying is the easiest way to eventually recover the data and re-establish compromised computing services, but hold on...
Computer Security: Dear summer students, welcome!
In order to make your digital life as comfortable as possible, there are a few things you need to know
Computer Security: The truth lies in the URL
Like last year, every CERN staff member and user received a fake message posing as a malicious attempt to convince them to click on the embedded link...
Computer Security: Block the bad, grant the good access
Adhering to network protocol standards, any outgoing traffic initiated from the so-called “lower ports”, i.e. ports 0-1023 or using so-called “private” or “non-routable” IP addresses will be blocked
Computer Security: What do accelerators and pipelines have in common?
Ransomware attacks against enterprises and academia are not a new phenomenon...
Computer Security: About risks and threats
The cyber-risks can be split into four categories: operational, financial, legal and reputational
Computer Security: Fancy dinner or burned pie?
Relying on external software packages comes with a risk. Successful attack scenarios have been executed in the past
Computer Security: Our findings, your problem
At CERN, you are the one primarily responsible for the computer security of all accounts, devices, websites, computing services and control systems you own and manage
Tackling tomorrow’s computing challenges today at the 2021 CERN openlab technical workshop
CERN openlab held its annual technical workshop on 9-11 March. Due to the pandemic, the 200 participants joined the workshop this year via Zoom
Computer Security: Your remote logins
As the very last line of defence, CERN employs automatic monitoring tools that will send a short notification for every login from a “new” location to the email address you have registered with CERN