SCADA network system security (Part 1)

Potential threats The management systems of industry, manufacturing and providing utility services such as electricity, oil, water, etc. are operated by electrical-electronic, mechanical, hydraulic equipment...

SCADA network system security (Part 2)

Principles for designing security systems for SCADA networks Designing a general security solution for SCADA network, as well as connecting SCADA network and IT network...

CyRadar warns of the phishing campaign assuming bank

Recently, there has been a group of scammers targeting users of Internet banking services. They impersonate sellers, dealing with victims, with fraudulent purpose of...

Security features for SCADA system

IPS feature for SCADA system The IPS feature for SCADA system is based on signature-base and is updated regularly. Especially with SCADA systems, IPS stores several...

Warning: Phishing campaign is attacking Skype users in Vietnam

On 20/04, CyRadar team discovered a Skype phishing campaign which is beginning to take place.Comes from the accounts of some users, bad guys will change the image of...

Detect hackers build the website “clones” Facebook

On March 17, a domain name using Unicode characters to "clone" Facebook domain was detected by CyRadar team - FPT Technology Innovation. When checking the...

Playing Facebook games increases the risk of losing your account

Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Gmail. Hackers could create a...

New trends in phishing campaign

An announcement about a campaign of spamming, impersonation Google domain has been announced not long ago. (http://thenextweb.com/google/2016/11/21/google-isnt-google/).CyRadar decided to carry the research conducted about...

How was the phishing campaigns to fake Zalo discovered?

Usually, we have to take a few days, even a few weeks to figure out a phishing campaign and take action to stop them....

The trend of towards developing solutions to detect attacks

During a roughly 30-year development, antivirus software appears impossible to end the ongoing war with those creating the malware. Subjectively speaking, malware is written...

New posts

Popular posts