By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to...
Author - Laetitia Lagneau
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys...
By Carolina Fernandez, Jordi Guijarro and Shuaib Siddiqui, i2cat Foundation Introduction of IdP environment in the context of identity security...
Ransomware is used by cyber criminals to block you from accessing your data and hold it ‘hostage’ until you pay the ransom. How does it work and how...
The CIRT of the Faculty Computer Science of the University of Skopje was founded 2.5 years ago as the result of a cybersecurity exercise which...
By Sonja Filiposka and Anastas Mishev, respectively head and former head of FINKI CIRT Nowadays phishing attacks are one of the most notorious and...
Continues from Demystiphying phishing – Part 1 By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) Phishing aims to steal your...
By Damien Mascré, David Verdin, Laurent Aublet-Cuvelier (RENATER) On the list of the many issues inflicted by emails, phishing appears to be social...
By Christine Glaser, Communications and Marketing Manager, Restena Foundation, with the contribution of Jean-Paul Weber, Security Engineer, Restena...
By Bruno Vuillemin, Security Officer of the University of Fribourg Sometimes a very simple fraud can cause a great deal of trouble. Whenever you...