Updates for Adobe Flash Player

Adobe has released security updates to address a vulnerability in Adobe Flash Player. If left unpatched, attackers could exploit them and gain complete control of the website. Therefore, BtCIRT recommends users and administrators to review  Adobe Security Update for more details and apply necessary updates immediately. Patch and be Protected....

Browser security

Web Browser is used to access information resources like websites, images, videos from the World Wide Wave(WWW).  Google Chrome, Microsoft Edge, Safari, Firefox are some of the commonly used browsers. Since these browsers are installed not only on Computers but also on cell phones, tablets and IoTs,  it has become one of the most used channel for cyber attack. Therefore, it is critical to understand the importance of using these browsers in a secure manner. By default,  most of the browsers come with minimum security features enabled, thus creating an easy platform for hacker to launch malicious code to get...

Extracting Full Email Header

Google Mail (GMail): Login to your account on the webpage and open the message (click on it). Click on the “down-arrow” on the top-right of the message and select “Show Original”. Now you will see the complete message source. Yahoo! Mail: Login to your account on the webpage and open the message (click on it). Click on “Actions” and select “View Full Header”. Hotmail : Login to your account on the webpage and go to the message list. Right-click on the message and select “View Message Source”. MS Outlook Open the message in MS Outlook. Right-click the message in...

Security on Social Media

The most popular social media platforms have billions of users, and the number keeps getting bigger every year. Facebook, Twitter, YouTube and Instagram to name a few—have gone beyond their initial purpose of sharing, entertainment, and communication. Now, enterprises see them as valid advertising tools and users have built careers out of sharing content. Information Sharing risks: Attackers may use social networking services to spread malicious code, compromise users’ computers, or access personal information about a user’s identity, location, contact information, and personal or professional relationships. You may also unintentionally reveal information to unauthorized individuals by performing certain actions....

Information and Network Security Workshop

Mr. Jamie Gillespie and Mr. Tashi Phuntsho from APNIC(Asia Pacific Network Information Center) are currently conducting a week long workshop on Information and Network Security Workshop from 9th- 13th October, 2017. The workshop will be covering topics on Network and Security threats and breaches, Policies and Counter measures. It is a platform to bring together important stakeholders from critical sectors and foster information sharing among them. Participants include ICT personnel from Banks, Power Corporation, Royal Bhutan Police,RUB Colleges, Dzongkhags and Ministries. The workshop is funded by EU(European Union) and TEIN*CC @TEIN (Trans-Eurasia Information Network* Corporation Center) through the Asi@Connect Project...