SPECIAL COMMUNICATION AND INFORMATION SECURITY STATE SERVICE

COMPUTER EMERGENCY
RESPONSE CENTER

Report Incident

Articles

Hackers Exploit Stolen Firefox Bug Information
7 Sept 2015

Hackers Exploit Stolen Firefox Bug Information

Mozilla is warning that at least one year ago, an attacker infiltrated the repository that it uses to log bugs pertaining to its Firefox browser, began stealing information relating to unpatched ...

Dangerous IE vulnerability opens door to powerful phishing attacks
5 Feb 2015

Dangerous IE vulnerability opens door to powerful phishing attacks

An Internet Explorer vulnerability lets attackers bypass the Same-Origin Policy, a fundamental browser security mechanism, to launch highly credible phishing attacks or hijack users’ accounts on any ...

CTB Locker and Critroni Ransomware Information Guide and FAQ
5 Feb 2015

CTB Locker and Critroni Ransomware Information Guide and FAQ

CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows ...

Ransomware: how to remove it, even when the computer does not boot?
16 Aug 2012

Ransomware: how to remove it, even when the computer does not boot?

Malware very often adds itself to the list of applications that start when operating system boots up. By doing so, it makes sure that when a user removes it during the system run, it will infect the ...

Flame’s code injection techniques
17 Aug 2012

Flame’s code injection techniques

Flame employs the most sophisticated system of code injections we’ve observed in malware. It distributes its elements throughout the OS processes using chains of up to three injections involving up ...

Anatomy of a Targeted Attack
17 Aug 2012

Anatomy of a Targeted Attack

We constantly deal with targeted attacks, and sometimes we are lucky enough to find the initial command and control mechanisms still live. On one malware response we found a piece of malware that was ...

Securing Your Web Browser
15 Apr 2011

Securing Your Web Browser

This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited ...

Home Network Security
11 Apr 2011

Home Network Security

This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of 'always-on' or broadband access services (such ...

Spyware
8 Apr 2011

Spyware

This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it as a tool for crimes ...

Using Wireless Technology Securely
7 Apr 2011

Using Wireless Technology Securely

In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free ...

Virus Basics
4 Apr 2011

Virus Basics

A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others ...

Before You Connect a New Computer to the Internet
12 Mar 2011

Before You Connect a New Computer to the Internet

This Tech Tip provides guidance for users connecting a new (or newly upgraded) computer to the Internet for the first time. It is intended for home users, students, small businesses, or any site with ...