bdcert.org
bdCERT | Bangladesh Computer Emergency Response Team
http://www.bdcert.org/resource_cert.html
PGP Fingerprint : 3739 F34E ECCE 55F3 9203 3689 78AA 5027 E8B5 89A6. Australian Computer Emergency Response Team. Brunei Computer Emergency Response Team. CERNET Computer Emergency Response Team. People's Republic of China. Indian Computer Emergency Response Team. National Computer network Emergency Response technical Team / Coordination Center of China. People's Republic of China. Taiwan E-Commerce Computer Emergency Response Team. Hong Kong Computer Emergency Response Team Coordination Centre.
blog.jpcert.or.jp
JPCERT/CC Blog: #Tsubame
http://blog.jpcert.or.jp/tsubame
5 posts categorized "#Tsubame". Oct 13, 2015. APCERT Annual General Meeting and Conference 2015 in Kuala Lumpur. Hi again, it’s Yuka from Global Coordination Division and also serving as APCERT. Secretariat. It’s been a while since I wrote here last time. My entry this time is about the biggest event of APCERT which we just recently attended, the Annual General Meeting (AGM) and Conference 2015. In Kuala Lumpur, Malaysia on 6-10 September. This event, hosted by CyberSecurity Malaysia. For the APCERT AGM ...
apcert.org
TSUBAME Working Group
http://www.apcert.org/about/structure/tsubame-wg/index.html
TSUBAME is a packet traffic monitoring system to observe suspicious scanning activities in the Asia Pacific and other regions. It aims to promote collaboration among mainly CSIRTs with a national responsibility in the Asia Pacific and other regions by using the common platform and enhance capability of global threat analyses by incorporating 3D visualization features to the common platform. Sample movie of the packet traffic. Real-time movie available for members at "TSUBAME Portal Site"). 9642; Member t...
stolenlantern.blogspot.com
~ The Versatility ~: Facebook and Internet, How you can get into trouble
http://stolenlantern.blogspot.com/2013/10/facebook-and-internet-how-you-can-get.html
Tuesday, October 15, 2013. Facebook and Internet, How you can get into trouble. If you are part of Generation Y then your daily life is all about being connected. Internet has revolutionized normal day to day life and people vivaciously getting part of social media. Don’t click on any links provided by unknown people. Don’t give any of your E-mail or Facebook account credentials for an example User Name, Password to anyone else. Always check that you’re accessing the correct URL. Next thing, most of the ...
stolenlantern.blogspot.com
~ The Versatility ~: October 2013
http://stolenlantern.blogspot.com/2013_10_01_archive.html
Tuesday, October 15, 2013. Facebook and Internet, How you can get into trouble. If you are part of Generation Y then your daily life is all about being connected. Internet has revolutionized normal day to day life and people vivaciously getting part of social media. Don’t click on any links provided by unknown people. Don’t give any of your E-mail or Facebook account credentials for an example User Name, Password to anyone else. Always check that you’re accessing the correct URL. Next thing, most of the ...
ecybersec.net
ABOUT US - eCybersec | Leading IT Security Provider Sri Lanka | Web Security
http://ecybersec.net/about-us
ECybersec Interview on TV Derana. The Information Assets Protector. Great Minds Behind The Name. PN Balasuriya – Chairman. During his tenure he has served in several key departments of Central Bank of Sri Lanka with a 20 years serve in Bank Supervision Department. While he was attached to Bank Supervision Department he was assigned to examine all major commercial Banks in Sri Lanka submitting examination reports to the Monetary Board of CBSL. Sanjee Balasuriya – MD, CEO and Founder. Sanjee Balasuriya is ...
ecybersec.net
FAQ'S - eCybersec | Leading IT Security Provider Sri Lanka | Web Security
http://ecybersec.net/faq
ECybersec Interview on TV Derana. 1 WHAT IS ADVANCE PERSISTENT THREAT. Multiple, sophisticated tools are used to attack the target. Attackers may employ bots, malware, spam, keystroke loggers, social engineering, etc. This part is rather self explanatory. As there is both capability and intent on the part of the attackers this becomes a serious threat. 2 WHAT IS A MALWARE. 3 WHAT IS A SPYWARE. Keys typed (including chat sessions and word processors). Sound received by the computer’s microphone. Applicati...
SOCIAL ENGAGEMENT