National KE-CIRT/CC (@kecirt) 's Twitter Profile
National KE-CIRT/CC

@kecirt

Official Twitter Account of the National Kenya Computer Incident Response Team - Coordination Centre. Email: [email protected]

ID: 910582087115268096

linkhttps://www.ke-cirt.go.ke calendar_today20-09-2017 19:11:02

1,1K Tweet

4,4K Followers

547 Following

National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

Keep your devices clean and your browsing smooth! Our latest #SecurityTechbyte tackles #Adware, the hidden culprit behind those relentless pop-up ads. Understand how to identify and eliminate it for a better online experience. #BeCyberSmart #cybersecuritytips

Keep your devices clean and your browsing smooth! Our latest #SecurityTechbyte tackles #Adware, the hidden culprit behind those relentless pop-up ads. Understand how to identify and eliminate it for a better online experience. #BeCyberSmart #cybersecuritytips
National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

Paying the ransom may no longer be enough. Our latest tech byte dives into Double Extortion Ransomware and why you need a stronger defense. #BeCyberSmart #cybersecuritytips

Paying the ransom may no longer be enough. Our latest tech byte dives into Double Extortion Ransomware and why you need a stronger defense. #BeCyberSmart #cybersecuritytips
National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

Don't let them trick you. When in doubt, delete the message. It's always better to be safe than sorry! #BeCyberSmart #cybersecuritytips #smishing

Don't let them trick you. When in doubt, delete the message. It's always better to be safe than sorry!
#BeCyberSmart #cybersecuritytips #smishing
National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

Imagine a hidden weakness in your software that hackers already know about, but you are unaware of. That's the essence of a Zero-Day Attack. #BeCyberSmart #CybersecurityTips #Zerodayattack

Imagine a hidden weakness in your software that hackers already know about, but you are unaware of. That's the essence of a Zero-Day Attack.
#BeCyberSmart #CybersecurityTips #Zerodayattack
National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

Is your phone acting on its own? It could be a Ghost Touch Attack! Today's Security Tech Byte is a heads-up on a clever scam where malware hijacks your screen, making phantom clicks to drain your accounts or send messages without your knowledge. #GhostTouch #BeCyberSmart

Is your phone acting on its own? It could be a Ghost Touch Attack! Today's Security Tech Byte is a heads-up on a clever scam where malware hijacks your screen, making phantom clicks to drain your accounts or send messages without your knowledge. #GhostTouch #BeCyberSmart
National KE-CIRT/CC (@kecirt) 's Twitter Profile Photo

You get an email from "HR" about a mandatory meeting. It uses your name, mentions your manager, and the link looks almost right. This is spear phishing, a targeted attack designed to trick you. #BeCyberSmart #phishingawareness

You get an email from "HR" about a mandatory meeting. It uses your name, mentions your manager, and the link looks almost right. This is spear phishing, a targeted attack designed to trick you. 
#BeCyberSmart #phishingawareness