Cybersecurity at MUNI

Practical and understandable advice that is also useful outside the university

 

Current courses

Kyberbezpečnostní tým Masarykovy univerzity si pro vás na toto období připravil adventní věnec, který vám každý týden osvětlí jedno téma, které se vám možná bude v předvánočním čase hodit. Podíváme se na to, jaké nástrahy mohou útočníci v kyberprostoru klást před Vánoci – tušíte správně, že nelení.

Advent wreath

Information on cyber security topics worth knowing about, especially during Christmas.

Returning to the semester and the responsibilities that come with it can be challenging at times. However, attackers in cyberspace never sleep and do not wait for us to look around again. That is why we have prepared a few tips that can save you extra worries.

Safe semester

How to save yourself from extra worries (not only) during the semester, thanks to a few steps?

What are social engineering techniques, and how to defend yourself if you encounter them? You will find out in nine compelling stories from different people who have faced this type of cyber attack.

Social engineering

Stories of frequent social engineering techniques

We chose practical information and prepared understandable guides, thanks to which you’ll act responsibly in cyberspace. Invest in yourself and gain knowledge that the university, employers, and you will truly appreciate and use. It’s up to you from now on!

Cybercompass

The navigator to the golden middle way in the world of cybersecurity


When and to whom
to report your suspicions?

Suspicious message? Does the computer behave strangely? Feel free to report your suspicions to the CSIRT-MU team, even if you are unsure. You will help yourself and others.


What should you know about right now?​

Articles

Recommendations on how to navigate safely in the cyber world and avoid risks.

Thanks to the cooperation of CSIRT-MU and the MUNI University of the Third Age (U3V), the course “Cybersecurity while working on a PC for seniors” was created in the spring semester. How was the course, and what are the impressions of the lecturers and graduates?​

Have you noticed that the sender's address sometimes looks trustworthy in similar e-mails at first glance? In the following article, you will learn how this situation is possible and how the e-mail headers are related to it.

More articles


Stay tuned! 

Follow us on social networks. We create relevant and up-to-date content for you, thanks to which you will always have an overview.

Twitter

LinkedIn


 

Or write to us:

csirt-info@muni.cz

You are running an old browser version. We recommend updating your browser to its latest version.

More info