This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... more...
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... more...
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... more...show link
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... more...