Tag - GARR

The human side of password security

By Andrea Pinzani, IT security expert at the Consortium GARR On average, each of us owns from 20 to 40 accounts. Unfortunately, however, we are not very good at creating strong passwords. We prefer short ones, often using personal information, common...

Read More

7 quick questions about password managers

The use of password managers is increasing. No surprise, as they simplify password security and are user friendly. Why do you need one and what are the benefits? We asked Stefano Zanero, Associate Professor at the Politecnico di Milano University...

Read More

Uncovering Android Ransomware with Explainable AI

By Michele Scalas, Davide Maiorca and Giorgio Giacinto, University of Cagliari Ransomware represents a serious threat that acts by locking the compromised device and encrypting its data (along with exfiltrating private information), forcing the device...

Read More

We got ransomware! Where is the backup?

By Leonardo Lanzi, coordinator of the GARR CERT Once upon a time… In March 2016, I had the chance to be near enough a ransomware infection to be able to examine how it functions and its effects and, as I was not being the real target, I was able to...

Read More

Ransomware and beyond

By Pier Luca Montessoro, University of Udine One day, one very bad day, you open your laptop and a red screen informs you that all your files have been encrypted and you have to pay a ransom in bitcoin to get them back. And what is worse, you know (or...

Read More

Simulating phishing to raise user awareness

By Maria Sole Scollo, IT security expert at Consortium GARR Even if phishing has been for many years now a well-known illegal practice, asking people for their sensitive information is still the most effective way for cyber criminals to get them. A good...

Read More

How to recognise phishing emails

By Roberto Cecchini (INFN – GARR) What is phishing? Phishing is one of the many social engineering techniques used to deceive users. It is a type of fraud used to obtain sensitive information from a person or a firm, such as passwords and credit...

Read More

Hacking humans is easier than hacking machines

By Francesco Ficarola, Università La Sapienza, Rome Warning: picture ahead showing animal in distress  If you are reading this, then chances are that you have heard of Social Engineering (SE) at least once in your life. Perhaps, right now, you are...

Read More
Skip to content