Developing security expertise and excellence within the NREN community SIG-ISM...
WISE
Real security on the internet can only be realised within a broader context of...
TF-CSIRT: Computer Security Incident Response Teams
Coordinating training, services and knowledge-exchange for security teams...
Community
To be effective, passwords need to be long, complicated and unique. It’s also a good idea to have a separate password for every account. But don’t worry, that’s doesn’t mean learning multiple passwords because there’s simple tech available to help with...
By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised device and encrypting its data (along with exfiltrating private information), forcing the device...
By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to examine how it functions and its effects and, as I was not being the real target, I was able to...
By Francesco Palmieri, professor of Computer Science at the University of Salerno Ransomware, considered today an important emergency from the cyber security point of view, is from malware agents who limit access to a device or to the data stored on it...
By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been encrypted and you have to pay a ransom in bitcoin to get them back. And what is worse, you know (or...