On Computer Security By the CERN Computer Security Team (http://cern.ch/security) (Edition of 2019) This publication is released under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License Table of Contents Table of Contents Table of Contents .......................................................................................................................... 2 Computer Security ........................................................................................................................ 9 What do apartments and computers have in common? (2019) .................................................. 9 When your mike spies on you (2019) ....................................................................................... 10 The rancid USB box of chocolate (2018) ................................................................................... 11 Linux: Windows revisited (2018) .............................................................................................. 12 Protect your Family (2018) ...................................................................................................... 12 An old scam in a new disguise (2018) ....................................................................................... 13 Stepping up in user education (2018) ...................................................................................... 14 Malware, ransomware, doxware and the like (2018) ............................................................... 15 Another way of making money with ads (2018) ....................................................................... 16 Enter the next level: Doxware (2017) ....................................................................................... 17 Why you got a new PDF reader (2017) ..................................................................................... 18 “WannaCry”? The importance of being patched (2017) ........................................................... 19 Drive-bye (2016) ...................................................................................................................... 21 Playing hardball? Unfortunately it’s necessary... (2016) ........................................................... 21 DNS to the rescue! (2016)........................................................................................................ 22 A few Christmas goodies for your security (2016) .................................................................... 23 Open door, open screen, open life... (2016) ............................................................................. 24 Flash, as bad as bad can be (2016) ........................................................................................... 24 Ransomware — When it is too late... (2016) ............................................................................ 25 Mac security — Nothing for old versions (2016) ...................................................................... 25 USB sticks — The silent killers (2015) ....................................................................................... 26 Bye, bye, Windows XP security... Welcome infections! (2014) ................................................. 27 Agility for computers (2014) .................................................................................................... 27 Don’t put your family at risk (2013) ......................................................................................... 28 Got a call from "Microsoft"? The social way infecting your PC (2012)....................................... 30 Infecting Windows, Linux & Mac in one go (2012) ................................................................... 30 Gotcha! Macs lose their innocence (2012) ............................................................................... 31 Found a USB stick? Go and infect your PC! (2012) .................................................................... 32 25 years — Happy Birthday! (2011) ......................................................................................... 32 Mobile and Cloud Security ........................................................................................................... 34 Un-confidentiality when using external e-mail (2019) .............................................................. 34 Trips and travel: Some recommendations (2017) ..................................................................... 35 2 | Page Table of Contents Pokémon GO! Or not? (2016) .................................................................................................. 36 I know where you have been… since forever! (2016) ............................................................... 37 Android’s Armageddon… Reloaded (2016) ............................................................................... 38 Update on your privacy – or lack of it (2015) ........................................................................... 39 Android’s armageddon (2015) ................................................................................................. 40 IT or not IT, that is the question (2015) .................................................................................... 40 Enter the cloud, pay with your password (2014) ...................................................................... 41 Your iPhone as a key-logger (2014) .......................................................................................... 42 Backed up and gone... (2013) .................................................................................................. 43 BYOD: Bring Your Own Disaster (2013) .................................................................................... 43 Android is the new Windows (2013) ........................................................................................ 44 Prison or “Prism”? Your data in custody (2013) ........................................................................ 45 … And thank you for your mobile data! (2012) ......................................................................... 46 One photo to rule your phone (2012) ...................................................................................... 47 Smartphone lost — Privacy gone (2012) .................................................................................. 47 When the “Lion” eats your data (2012) .................................................................................... 48 Is your Android running a temperature? (2012) ....................................................................... 49 IPhones, Androids, and history repeating (2011)...................................................................... 49 Send your data into the cloud and make it… vaporize (2011) ................................................... 50 Network and Data Center Security .............................................................................................. 52 Spectre and Meltdown, just the beginning? (2018) .................................................................. 52 Scaling out intrusion detection (2018) ..................................................................................... 53 Hardball for attackers (2017) ................................................................................................... 54 CERN under friendly poking (2017) .......................................................................................... 55 An attack for more security (2017) .......................................................................................... 56 Transparent monitoring for your protection (2016) ................................................................. 57 DirtyCow BBQ — Well done, CERN! (2016) .............................................................................. 58 Hacking CERN — A win-win for all (2015) ................................................................................. 59 “Heartbleed” — A disaster for privacy (2014) .......................................................................... 60 After Prism & Tempora: How much monitoring is OK for CERN? (2013) ................................... 61 The lure of wireless encryption (2013) ..................................................................................... 62 Why I like power cuts... (2012) ................................................................................................ 63 Account and Password Security ................................................................................................... 64 I love you (2019) ...................................................................................................................... 64 The easy way to lose passwords (2018) ................................................................................... 65 3 | Page Table of Contents CERN secure password competition (2018, 2015) .................................................................... 66 CERN secure password competition… NOT! (2018) .................................................................. 67 Brain power vs. password managers (2017) ............................................................................. 68 Pimp up your password (2016) ................................................................................................ 69 The value of your password (2016) .......................................................................................... 70 What is your identity? (2016) .................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages197 Page
-
File Size-