What is what in IT
 |
Fake phone number
a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious payment, granting a loan or other fact, tries to lure out sensitive data, e.g. payment card data, login data for electronic banking or codes from SMS messages. The goal of fraudsters is to use these data to transfer money from your account to their own, or to make a purchase on the Internet using the data for your account or card.
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
je pokus o podvodné získanie citlivých informácií, ako sú heslá, údaje o kreditných kartách, vydávaním sa za dôveryhodnú osobu alebo inštitúciu pri elektronickej komuniká... more...
▪ Subject - private or public organization ▪ if at the same time ▪ provides at least one service listed in the annexes of the directive and at the same time ▪... more...
show all
 Interesting
|
22 |
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
show all
 Recomendations
|
377 |
Implement least privilege and monitoring
Source: it.portal
Implement regular access reviews.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o ochrane utajovaných skutočností a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Vyhláška Ministerstva dopravy, výstavby a regionálneho rozvoja Slovenskej republiky, ktorou sa ustanovujú podrobnosti o odbornej príprave, o odbornej skúške a o výkone či... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|