By Tommaso Rescio, Francesca Soro, Giulia Milan – Centro SmartData@PoliTO – Politecnico di Torino The measures adopted to reduce the spread of the...
Author - Davina Luyten
By Prof. Oliver Popov, Department of Computer and Systems Sciences, Stockholm University In 2008, Poland and Sweden recognised the need for a forum for wider...
By Prof. Marijke Coetzee, University of Johannesburg Ransomware is on the rise. In the USA, it is estimated that around 65,000 successful breaches occurred in...
By Nil Ortiz, Carolina Fernández, Jordi Guijarro and Shuaib Siddiqui, i2CAT Knowing about our public identity Our identity is scattered along a myriad of sites...
By Leonardo Lanzi, coordinator of the GARR-CERT Hi, probably you’re reading this while connected to your home wireless network and you already followed...
By Joeri de Ruiter, Technical Product Manager at SURF Nowadays, wherever you go it is likely that there is free wifi on offer. This can be very convenient when...
Whether you play chess, Taboo or Tomb Raider, games are entertaining and hold the attention. For a moment in time, the world of the game becomes reality, and...
The most unfortunate thing about backups is that we usually realise we need one when it’s already too late. We want to recover data we lost, but – unless...
Theoretic training is never as effective as practical training, theoretic knowledge may not always be enough, let’s find out why. By Justinas Rastenis...
Security awareness is all about training and educating users. Strengthening the so-called ‘human firewall’ is a very powerful tool in the fight against...
The European Cyber Security Month is approaching fast. On 1 October we will kick-off our “Cyber Hero @ Home” campaign! This year the programme will focus on...
October 2021 will be Cyber Security Month. Also this year GÉANT will launch a campaign to raise cybersecurity awareness within the R&E community. After the...
As 2020 draws to a close, the final steps will be taken in the redesign of the Belnet network. With this ambitious project, we have succeeded in significantly...
By Jon Hunt, cyber services delivery manager at Jisc Criminals always find a way to take advantage of disasters. In the case of COVID-19, there has been...
The primary objective of the LITNET CERT, the Computer Emergency Response Team of the LITNET networks is to tackle security incidents, but it is also fully...
By Andrea Pinzani, IT security expert at the Consortium GARR On average, each of us owns from 20 to 40 accounts. Unfortunately, however, we are not very good...
The use of password managers is increasing. No surprise, as they simplify password security and are user friendly. Why do you need one and what are the...
To be effective, passwords need to be long, complicated and unique. It’s also a good idea to have a separate password for every account. But don’t worry...
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to...