Government of the Republic of Trinidad and Tobago                                                                                                                                        


News

SonicWall Cyber Threat Report 2018

by ttcsirtadmin | 22nd June 2018

The modern cyberwar — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. Many are simple and effective. Others are targeted and complex. Yet they are all highly dynamic and require persistence, commitment and resources to mitigate. Further information on this topic can be found […]

Read More

Cisco: 2018 Annual Cybersecurity Report

by ttcsirtadmin | 22nd June 2018

What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Further information on this topic can be found in the […]

Read More

OWASP: Top Ten Most Critical Web Application Vulnerabilities For 2017

by ttcsirtadmin | 30th April 2018

Insecure software is undermining critical infrastructure woldwide. As our infrastructure becomes increasingly complex and connected, the difficulty of achieving application security increases exponentially. Further information on this topic can be found in the article entitled “OWASP: Top Ten Most Critical Web Application Vulnerabilities For 2017” which can be downloaded via the TTCSIRT Website at https://ttcsirt.gov.tt/documents/owasp2017.pdf

Read More

OPUS: Six Strategies for Defense-in-Depth

by ttcsirtadmin | 30th April 2018

Serious issues often originate inside the network: everything from worms, viruses, and Trojan horses to unsecured wireless networks, peer-to-peer mobile communications and guest users can compromise the security of corporate networks. Thus, to address these threats, the corporate network should no longer be a single homogeneous zone in which users connect from anywhere in the […]

Read More

Phishing Activity Trends Report 2017

by ttcsirtadmin | 10th April 2018

Phishing is a criminal mechanism employing both social engineering and technical subterfuge to steal consumers’ personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails purporting to be from legitimate businesses and agencies, designed to lead consumers to counterfeit websites that trick recipients into divulging financial data such as usernames and passwords. […]

Read More

Defending Against Phishing Attacks

by ttcsirtadmin | 10th April 2018

Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake […]

Read More

Cyber Security Trends 2018

by ttcsirtadmin | 22nd March 2018

Following an analysis of the progression of ransomware and ongoing attacks on critical infrastructure, highlighted in the previous chapters, it becomes clear that cyberattacks will continue to expand in scope and volume over the coming year. However, we must not lose sight of the fact that these complex scenarios are just one aspect of cybercrime […]

Read More

Hacker Report 2018

by ttcsirtadmin | 22nd March 2018

Some of the most critical vulnerabilities in the Internet’s history have been discovered and resolved thanks to the efforts of hackers fueled by curiosity and altruism. Acalvio Technologies Chief Security Architect Chris Roberts puts it this way, “Hackers unfortunately are [often] portrayed as the bad guys, whereas I would argue that for the last 20 […]

Read More

Understanding DDOS Attacks

by ttcsirtadmin | 22nd February 2018

A Denial of Service (DoS) attack is an attempt to make a system unavailable to the intended user(s), such as preventing access to a website. A successful DoS attack consumes all available network or system resources, usually resulting in a slowdown or server crash. Whenever multiple sources are coordinating in the DoS attack, it becomes […]

Read More

Understanding SQL Injection Attacks

by ttcsirtadmin | 22nd February 2018

SQL injection was one of the primary attack vectors responsible for many of 2011’s high profile compromises including Sony Pictures, HBGary, and PBS. It was also responsible for the more recent Adobe data breach in which names, email addresses, and password hashes were stolen from one of their customer databases. SQL injection is a dangerous […]

Read More

Page 1 of 512345