Kyberbezpečnostní tým Masarykovy univerzity si pro vás na toto období připravil adventní věnec, který vám každý týden osvětlí jedno téma, které se vám možná bude v předvánočním čase hodit. Podíváme se na to, jaké nástrahy mohou útočníci v kyberprostoru klást před Vánoci – tušíte správně, že nelení.
Cybersecurity at MUNI
Practical and understandable advice that is also useful outside the university
Information on cyber security topics worth knowing about, especially during Christmas.
Returning to the semester and the responsibilities that come with it can be challenging at times. However, attackers in cyberspace never sleep and do not wait for us to look around again. That is why we have prepared a few tips that can save you extra worries.
How to save yourself from extra worries (not only) during the semester, thanks to a few steps?
What are social engineering techniques, and how to defend yourself if you encounter them? You will find out in nine compelling stories from different people who have faced this type of cyber attack.
Stories of frequent social engineering techniques
We chose practical information and prepared understandable guides, thanks to which you’ll act responsibly in cyberspace. Invest in yourself and gain knowledge that the university, employers, and you will truly appreciate and use. It’s up to you from now on!
The navigator to the golden middle way in the world of cybersecurity
When and to whom
to report your suspicions?
What to watch out for when surfing in the Masaryk University cyberspace?
Warning: the threat of university account compromise
The Cybersecurity Team of Masaryk University warns against a spear-phishing campaign by which an attacker tries to lure login information from MUNI employees.
Warning: weaponized open-source tools
We would like to draw your attention to increasingly frequent attacks using the weaponization of open-source tools, which target a wide range of organizations from the media, through defense and aerospace, to the IT services industries. The attacks are carried out using social engineering. Thanks to this, the attackers lure job seekers with fraudulent job offers. An ISO file infected with Trojan malware is subsequently sent to the applicants who respond to such an offer.
Recommendations on how to navigate safely in the cyber world and avoid risks.
Thanks to the cooperation of CSIRT-MU and the MUNI University of the Third Age (U3V), the course “Cybersecurity while working on a PC for seniors” was created in the spring semester. How was the course, and what are the impressions of the lecturers and graduates?
8 Tips for a Safer Summer
Why not share photos from your holiday at the current time and what to prepare for before leaving (not only) abroad?
Have you noticed that the sender's address sometimes looks trustworthy in similar e-mails at first glance? In the following article, you will learn how this situation is possible and how the e-mail headers are related to it.