Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Protection against Malware

  • Keep security software current: Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats.
  • When in doubt, throw it out: Links in e-mail, tweets, posts and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
  • Protect all devices that connect to the Internet: Along with computers, smartphones, gaming systems and other web-enabled devices also need protection from viruses and malware.
  • Plug & scan:USBs and other external devices can be infected by viruses and malware. Use your security software to scan them.

(Author: National Cyber Security Alliance, published under Public License)

First publication 05. 3. 2018. Last update 16. 3. 2018 14:44
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250422-02

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor knižnica Erlang/OTP SSH – kritická ...22. April 2025

SK-CERT Bezpečnostné varovanie V20250422-01

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor knižnica PyTorch – kritická bezpečnostná ...22. April 2025

SK-CERT Bezpečnostné varovanie V20250417-03

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Siemens TeleControl Server Basic – ...17. April 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 15. 05. 2025 10:58
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS