Government of the Republic of Trinidad and Tobago
gov.tt

Securing the Nation's Digital Infrastructure

State Of Malware Report 2017

The year 2016 saw, yet again, the threats malware posed: 1. Ransomware grabbed headlines and became the favorite attack methodology used against businesses. 2. Ad fraud malware, led by Kovter malware, exceeded ransomware detections at times and poses a substantial threat to consumers and businesses. 3. Botnets infected and recruited Internet of Things devices to …

Mobile Security Report 2016

As mobility and BYOD grow in the workplace, so do challenges from managing bandwidth and device access to handling the most pressing concerns of security. The 2016 BYOD and Mobile Security Report focuses on these security challenges and offers fresh insights on the state of mobile threats and solutions. The BYOD and Mobile Security Report …

How To Recover A Hacked Twitter Account

What you do after having your twitter account hacked depends on two things: whether you can gain control of your account and what crisis communications plan your business has in place. Read about the steps you can take to handle a hacked twitter account by referring to the TTCSIRT article entitled How To Recover A …

Social Media Threats To Be Aware Of

Social networking sites like Facebook, Twitter, Instagram, Google +, and many other popular online hubs link us together in a digital society where we can make the most out of our social liberties. More businesses are also starting to re-allocate budgets towards social media in place of traditional advertising. While there are numerous benefits to …

Recovering A Hacked Facebook Account

There are any number of ways hackers may have hacked your Facebook account. They could have guessed your password, set up an Evil Twin Wi-Fi Hotspot at a coffee shop and stolen your credentials through a Man-in-the-middle attack, you could have left your account logged in at the computer lab at your school or maybe …

Social Networking Safety Tips

Social networking is a method of communication with people through online platforms such as Facebook, LinkedIn, and Twitter. Over the years, social networking has become an important part of life for both adults and teens. The popularity is due to the ability of meeting the needs and interests of a vast majority of people. For …

Online Safety Tips

Why are these warnings important? Like the real world, technology and the Internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real world, you need to take precautions to protect yourself online. For many users, …

Avoiding Social Engineering and Phishing Attacks

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that …

Petya Ransomware Technical Intelligence Analysis

The Petya Ransomware successfully infected several industries including banks as well as media outlets, energy companies, power and utilities, telecoms, life sciences, transportation government agencies, airports and radiation monitoring equipment within the Chernobyl power plant. While Ukraine seems to have been the first and hardest hit, other organizations across the globe were affected. We are …

TTCSIRT-017.062717: TT-CSIRT Advisory – Petya Ransomware

Date First published: 27/6/2017 1.0 Introduction Discovered: June 27, 2017 Updated: June 27, 2017 12:30pm Type: Ransomware Infection Length: Varies Systems Affected: Client Computers, Servers, Websites This is an alert from TTCSIRT that there are early signs of a new ransomware outbreak currently affecting a large number of countries across the globe such as the …