<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/nb-no/images/repository/isc/2017-images/web-img-05.jpg

    Identity Theft: Facts and FAQ

    Identity theft is on the rise. How are attackers getting this information? Who's at risk? More importantly, how can you protect yourself? Here's everything you need to know.

    Read more
  • content/nb-no/images/repository/isc/2017-images/spam-img-01.jpg

    What is Spam and a Phishing Scam - Definition

    Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

    Read more
  • content/nb-no/images/repository/isc/2017-images/malware-img-55.jpg

    Targeted Attacks

    Unlike mass computer virus attacks – that aim to infect as many computers as possible – targeted attacks use a totally different approach. Instead, targeted attacks try to infect the network of a single targeted company or organisation – or apply a specially developed Trojan agent to a single server on the organisation’s network infrastructure.

    Read more
  • content/nb-no/images/repository/isc/2017-images/malware-img-46.jpg

    What is Pornware?

    Pornware is the name given to a class of programs that display pornographic material on a device. In addition to the programs that some users may deliberately install on their computers and mobile devices – to search for and display pornographic material – Pornware also includes programs that have been maliciously installed, without the user having any knowledge of their presence...

    Read more
  • content/nb-no/images/repository/isc/2017-images/threats-img-01.jpg

    What are Suspicious Packers?

    In order to prevent the reverse engineering of a malicious software program and to hinder the analysis of the program’s behaviour, malware developers may compress – or pack – their malicious programs, using a variety of methods combined with file encryption...

    Read more
  • content/nb-no/images/repository/isc/2017-images/spam-img-02.jpg

    Support for Spammers

    Trojan proxy-servers – and multipurpose Trojan viruses that function as proxy servers – can attack and infect multiple computers, in order to establish a ‘zombie network’. The cybercriminal then has control over every computer within the zombie network and can use their combined computing power for the mass distribution of spam email...

    Read more
  • content/nb-no/images/repository/isc/2017-images/malware-img-62.jpg

    TorrentLocker Ransomware

    TorrentLocker (Trojan-Ransom.Win32.Rack in Kaspersky Lab classification) is a type of cryptographic ransomware which is gaining increasing popularity nowadays.

    Read more
  • content/nb-no/images/repository/isc/2017-images/web-img-15.jpg

    What is Smishing and How to Defend Against it?

    A nefarious text message could be on its way to a smartphone near you. This is a message, often purporting to be from your bank asking you for personal or financial information such as your account or ATM number. Providing the information is as good as handing thieves the keys to your bank balance.

    Read more
  • content/nb-no/images/repository/isc/2017-images/malware-img-21.jpg

    The Desert Falcons

    Desert Falcons is a group of cybermercenaries operating from the Middle East and using a set of methods to hide and operate malware.

    Read more
  • content/nb-no/images/repository/isc/2017-images/malware-img-24.jpg

    GCMAN: how to steal $200 per minute

    GCMAN: How to Steal $200 per minute - Threat Definition

    Read more
Resources not available.