The Department of Information Technology and Telecom, has now completed its advocacy program for cyber security planned for the FY 2017-2018. The program has been aimed at continually sensitize end users across the country on the importance of developing safe habits and good practices for basic cyber security. BtCIRT has visited Dzongkhags to spread awareness on ensuring safety in the cyberspace, recognizing risks and reacting to attacks and to advocate measures to proactively combat cyber threats, individually and collectively. 1. Trashigyangtse – 29/12/2017 Trashiyangtse Dzongkhag awareness program was attended by 30 participants. The potential risks of getting confidential information...
Security Updates from Cisco
Cisco has released security updates to address vulnerabilities in earlier version of multiple products. If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review Cisco Security Advisories for more details on affected products and apply the necessary updates. Patch and be Protected. ...
Oracle Critical Patch Update Advisory – January 2018
Oracle has released “Oracle Critical Patch Update Advisory – January 2018” with 237 new security fixes across multiple products addressing vulnerabilities in earlier versions. If left unpatched, attackers could exploit them and gain complete control of the system. Therefore, BtCIRT recommends users and administrators to review Critical Patch Update-January 2018 for more details on affected products and apply the necessary updates. Patch and be Protected....
Security Advisories for DHCP and BIND
The Internet Systems Consortium (ISC) has released Security updates or workarounds to address vulnerabilities affecting some versions of DHCP and BIND. If left unpatched, attackers could exploit them and cause a denial-of-service condition. Therefore, BtCIRT recommends users and administrators to review DHCP and BIND for more details and apply the necessary updates. Patch and be Protected. ...
Security of Mobile Devices
Introduction: Today’s advanced mobile devices are well integrated with the Internet and have far more functionality than mobile phones of the past. They are increasingly used in the same way as personal computers (PCs), potentially making them susceptible to similar threats affecting PCs connected to the Internet. Since mobile devices can contain vast amounts of sensitive and personal information, they are attractive targets that provide unique opportunities for criminals intent on exploiting them. Both individuals and society as a whole can suffer serious consequences if these devices are compromised. A multitude of threats exist for mobile devices, and the list...