On Computer Security by the CERN Computer Security Team ( (Edition of 2019)

On Computer Security by the CERN Computer Security Team ( (Edition of 2019)

On Computer Security By the CERN Computer Security Team (http://cern.ch/security) (Edition of 2019) This publication is released under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License Table of Contents Table of Contents Table of Contents .......................................................................................................................... 2 Computer Security ........................................................................................................................ 9 What do apartments and computers have in common? (2019) .................................................. 9 When your mike spies on you (2019) ....................................................................................... 10 The rancid USB box of chocolate (2018) ................................................................................... 11 Linux: Windows revisited (2018) .............................................................................................. 12 Protect your Family (2018) ...................................................................................................... 12 An old scam in a new disguise (2018) ....................................................................................... 13 Stepping up in user education (2018) ...................................................................................... 14 Malware, ransomware, doxware and the like (2018) ............................................................... 15 Another way of making money with ads (2018) ....................................................................... 16 Enter the next level: Doxware (2017) ....................................................................................... 17 Why you got a new PDF reader (2017) ..................................................................................... 18 “WannaCry”? The importance of being patched (2017) ........................................................... 19 Drive-bye (2016) ...................................................................................................................... 21 Playing hardball? Unfortunately it’s necessary... (2016) ........................................................... 21 DNS to the rescue! (2016)........................................................................................................ 22 A few Christmas goodies for your security (2016) .................................................................... 23 Open door, open screen, open life... (2016) ............................................................................. 24 Flash, as bad as bad can be (2016) ........................................................................................... 24 Ransomware — When it is too late... (2016) ............................................................................ 25 Mac security — Nothing for old versions (2016) ...................................................................... 25 USB sticks — The silent killers (2015) ....................................................................................... 26 Bye, bye, Windows XP security... Welcome infections! (2014) ................................................. 27 Agility for computers (2014) .................................................................................................... 27 Don’t put your family at risk (2013) ......................................................................................... 28 Got a call from "Microsoft"? The social way infecting your PC (2012)....................................... 30 Infecting Windows, Linux & Mac in one go (2012) ................................................................... 30 Gotcha! Macs lose their innocence (2012) ............................................................................... 31 Found a USB stick? Go and infect your PC! (2012) .................................................................... 32 25 years — Happy Birthday! (2011) ......................................................................................... 32 Mobile and Cloud Security ........................................................................................................... 34 Un-confidentiality when using external e-mail (2019) .............................................................. 34 Trips and travel: Some recommendations (2017) ..................................................................... 35 2 | Page Table of Contents Pokémon GO! Or not? (2016) .................................................................................................. 36 I know where you have been… since forever! (2016) ............................................................... 37 Android’s Armageddon… Reloaded (2016) ............................................................................... 38 Update on your privacy – or lack of it (2015) ........................................................................... 39 Android’s armageddon (2015) ................................................................................................. 40 IT or not IT, that is the question (2015) .................................................................................... 40 Enter the cloud, pay with your password (2014) ...................................................................... 41 Your iPhone as a key-logger (2014) .......................................................................................... 42 Backed up and gone... (2013) .................................................................................................. 43 BYOD: Bring Your Own Disaster (2013) .................................................................................... 43 Android is the new Windows (2013) ........................................................................................ 44 Prison or “Prism”? Your data in custody (2013) ........................................................................ 45 … And thank you for your mobile data! (2012) ......................................................................... 46 One photo to rule your phone (2012) ...................................................................................... 47 Smartphone lost — Privacy gone (2012) .................................................................................. 47 When the “Lion” eats your data (2012) .................................................................................... 48 Is your Android running a temperature? (2012) ....................................................................... 49 IPhones, Androids, and history repeating (2011)...................................................................... 49 Send your data into the cloud and make it… vaporize (2011) ................................................... 50 Network and Data Center Security .............................................................................................. 52 Spectre and Meltdown, just the beginning? (2018) .................................................................. 52 Scaling out intrusion detection (2018) ..................................................................................... 53 Hardball for attackers (2017) ................................................................................................... 54 CERN under friendly poking (2017) .......................................................................................... 55 An attack for more security (2017) .......................................................................................... 56 Transparent monitoring for your protection (2016) ................................................................. 57 DirtyCow BBQ — Well done, CERN! (2016) .............................................................................. 58 Hacking CERN — A win-win for all (2015) ................................................................................. 59 “Heartbleed” — A disaster for privacy (2014) .......................................................................... 60 After Prism & Tempora: How much monitoring is OK for CERN? (2013) ................................... 61 The lure of wireless encryption (2013) ..................................................................................... 62 Why I like power cuts... (2012) ................................................................................................ 63 Account and Password Security ................................................................................................... 64 I love you (2019) ...................................................................................................................... 64 The easy way to lose passwords (2018) ................................................................................... 65 3 | Page Table of Contents CERN secure password competition (2018, 2015) .................................................................... 66 CERN secure password competition… NOT! (2018) .................................................................. 67 Brain power vs. password managers (2017) ............................................................................. 68 Pimp up your password (2016) ................................................................................................ 69 The value of your password (2016) .......................................................................................... 70 What is your identity? (2016) .................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    197 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us