{"id":2009,"date":"2020-04-23T09:24:17","date_gmt":"2020-04-23T07:24:17","guid":{"rendered":"https:\/\/wpethzprd.ethz.ch\/its\/?p=2009"},"modified":"2020-04-23T09:24:26","modified_gmt":"2020-04-23T07:24:26","slug":"cyber-risks-in-times-of-the-coronavirus","status":"publish","type":"post","link":"https:\/\/blogs.ethz.ch\/its\/2020\/04\/23\/cyber-risks-in-times-of-the-coronavirus\/","title":{"rendered":"Cyber Risks in Times of the Coronavirus"},"content":{"rendered":"\n<p>In corona times, we do not only have to protect ourselves from COVID-19: Especially in this phase, cyber attacks and viruses on the computer have an easier game. So watch out, washing your hands is not sufficient!<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Many people work from home on personal devices and in their own Wi-Fi. In this situation it is difficult to keep your software up to date. This in turn makes it easier for cyber attackers to gain access. Telephone calls or emails that supposedly provide important information about the corona virus can turn out to be attacks. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"581\" src=\"https:\/\/blogs.ethz.ch\/its\/files\/2020\/04\/image.imageformat.fullwidth.2015602961.jpg\" alt=\"Corona-\u200brelated cyberattacks\" class=\"wp-image-2011\" srcset=\"https:\/\/blogs.ethz.ch\/its\/files\/2020\/04\/image.imageformat.fullwidth.2015602961.jpg 930w, https:\/\/blogs.ethz.ch\/its\/files\/2020\/04\/image.imageformat.fullwidth.2015602961-300x187.jpg 300w, https:\/\/blogs.ethz.ch\/its\/files\/2020\/04\/image.imageformat.fullwidth.2015602961-768x480.jpg 768w, https:\/\/blogs.ethz.ch\/its\/files\/2020\/04\/image.imageformat.fullwidth.2015602961-600x375.jpg 600w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><figcaption><em>Corona-\u200brelated cyberattacks<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Wide range of dangers<\/h2>\n\n\n\n<p>Strictly\nworking from home unfortunately only protects against pathogens. Viruses on\ntechnical devices still exist. Phishing mails, phone calls or fake shops for\nmedical products: The possibilities for cyber attackers are endless. The topic\nof coronavirus is on everyone&#8217;s mind at this time, so it is easy to unsettle\nsomeone. Be prepared for targeted attacks!<\/p>\n\n\n\n<p>Unfortunately,\nhowever, the usual scam methods are also in circulation. The sometimes\npieced-together home office facilities are able to handle them with the left\nhand. So be careful there too. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do we protect\nourselves? <\/h2>\n\n\n\n<p>You can read more about the possible attacks and measures to be taken in case of cyber attacks in the article <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/ethz.ch\/services\/en\/news-and-events\/internal-news\/archive\/2020\/04\/forewarned-is-forearmed%20.html\" target=\"_blank\">Forewarned is forearmed<\/a> in the ETH-internal Newsletter by Kathrin Noack. <\/p>\n\n\n\n<p>The IT security initiative of ETH Z\u00fcrich: <a href=\"https:\/\/itsecurity.ethz.ch\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PROTECT YOUR BRAINWORK. (opens in a new tab)\">PROTECT YOUR BRAINWORK.<\/a> Learn how to handle devices and data safely and responsibly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In corona times, we do not only have to protect ourselves from COVID-19.<\/p>\n","protected":false},"author":45378,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257891,25],"tags":[282146,282145,3163,179839,104293,179840],"class_list":["post-2009","post","type-post","status-publish","format-standard","hentry","category-it-sec","category-news","tag-corona-times","tag-cyber-risks","tag-it-security","tag-it-security-initiative","tag-phishing-mails","tag-protect-your-brainwork"],"_links":{"self":[{"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/posts\/2009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/users\/45378"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/comments?post=2009"}],"version-history":[{"count":0,"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/posts\/2009\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/media?parent=2009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/categories?post=2009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ethz.ch\/its\/wp-json\/wp\/v2\/tags?post=2009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}