By Jon Hunt, cyber services delivery manager at Jisc Criminals always find a way to take advantage of disasters. In the case of COVID-19, there has been a surge in phishing emails and online scams by nefarious individuals and organised gangs who want to...
Security
Cyber-attacks were a key feature of the 2008 Russo-Georgian war; they affected websites of news agencies, the Georgian President and were implicated in the explosion of an oil pipeline. At that time in Georgia there was no governmental CERT (Computer...
By Guillaume Rousse, IT Security Engineer at GIP RENATER These days, passwords are a universal authentication method, because they are simple to configure on the server side, easy to use from any terminal, and simple to understand for the user...
The primary objective of the LITNET CERT, the Computer Emergency Response Team of the LITNET networks is to tackle security incidents, but it is also fully dedicated to their prevention. In order to deal with shared security challenges, the CERT has been...
By Urpo Kaila, Head of Security at CSC, Finland The password is dead, we have been hearing this for a very long time. ‘You need to use keys, certificates, tokens, biometrics, or at least passphrases, but not passwords, they are history’, it was said. But...