Government of the Republic of Trinidad and Tobago                                                                                                                                        


Report

Report any activities that you feel meet the criteria for an incident or phishing attack.


Feedback

We welcome you to send us your suggestions and feedback.


Subscribe

Subscribe to our newsletter to receive a digest of cybersecurity news, security updates and cyber security advisories


Current Activity

SonicWall Cyber Threat Report 2018

The modern cyberwar — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. Many are simple and effective. Others are targeted and complex. Yet they

Cisco: 2018 Annual Cybersecurity Report

What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Further



                                                                                                               




Apple Partially Fixes FaceTime Spying Bug

Apple reported on Friday that the FaceTime spying bug that has been making headlines in the past days has been partially fixed, but users will have to wait until next week for a software update. According to Apple, a server-side patch has been implemented, but the application update that re-enables the Group FaceTime feature will […]

Flaw Possibly Affecting 500,000 Ubiquity Devices Exploited in the Wild

Nearly half a million Ubiquity devices may be affected by a vulnerability that has already been exploited in the wild, security experts warned last week. Jim Troutman, consultant and director of the Northern New England Neutral Internet Exchange (NNENIX), revealed last week on Twitter that hackers had been remotely targeting Ubiquity networking devices exposed via […]

Attackers Use CoAP For DDoS Amplification

Attackers recently started abusing the Constrained Application Protocol (CoAP) for the reflection/amplification of distributed denial of service (DDoS) attacks, NETSCOUT warns. CoAP is a simple UDP protocol designed for low-power computers on unreliable networks that appears similar to HTTP, but which operates over UDP (User Datagram Protocol) port 5683. The protocol is mainly used by […]