News
News
Computer Security: Un-confidentiality when using external e-mail
Using the CERN e-mail service gives you some flexibility, but some current practices can have severe implications for password secrecy and the confidentiality of certain documents sent by e-mail
Computer Security: Professional access to private devices
Once you are connected to CERN’s wired or wireless networks, you are bound by CERN’s Computing Rules, which requires you to always keep your system up-to-date, fully patched and protected against unauthorised access
Computer Security: Click me – NOT!
In late June, CERN was subjected to a wave of seemingly targeted e-mails containing a potentially malicious PDF or DOC attachment
Computer Security: When your mike spies on you
Here are two new twists – probably still theoretical, but both pointing towards new ways to spy on you by misusing your microphone…
Computing boost for Lebanon and Nepal
Post-conflict nations establish supercomputing centres with CERN servers in a bid to stem brain-drain of highly-skilled graduates
Computer Security: Welcome Summer Students!
In order to make your digital life as comfortable as possible, here are few useful things to know
Computer Security: Serious gaming… for your own good
“Serious gaming” is the gamification of training for professional purposes. When you play a serious game, you are actually also improving your knowledge on a particular subject
Migrating to open-source technologies
Taking back control using open software
Computer Security: Software Bugs: What if?
Do you know what drugs and proprietary software have in common? You bear the consequences if the product you buy is of mediocre quality
Computer Security: Go clever! Go central!
Running your own computing hardware, installation stack, (web) applications, databases, etc., is just not cost effective and usually you won’t be able to commit the required attention to keeping those systems sufficiently secure