Skip to main content
Cert logo
Created with Sketch.
Return to homepage
Search
Main navigation
IT specialists
Right Arrow
Advisories
Right Arrow
Left Arrow
Back
Advisories
UPnProxy and 'EternalSilence' being used to exploit routers
Banking malware targeting business customers of New Zealand banks
VPNFilter malware
S/MIME and OpenPGP email client vulnerability
Cisco Smart Install misuse
MikroTik RouterOS vulnerability
Memcached reflection denial-of-service
Meltdown and Spectre CPU vulnerabilities
Certain TLS-RSA implementations susceptible to ROBOT attack
Bad Rabbit Ransomware affecting Eastern European networks
ROCA: Major security flaw in crypto keys discovered
KRACK attack: security vulnerabilities in WPA1+2
BlueBorne: Bluetooth security vulnerabilities
Onliner Spambot release of 711 million credentials
MPI phishing scam
New ransomware campaign known as NotPetya
Shadow Brokers release of software vulnerabilities
Anti Public and Exploit.in release of credentials
WannaCry Ransomware used in large scale international attacks
Global campaign targeting multi-national IT service providers
Report an incident
Critical controls
Right Arrow
Left Arrow
Back
Critical controls
Multi-factor authentication
Right Arrow
Left Arrow
Back
Multi-factor authentication
Implementing multi-factor authentication
Report an incident
Patching
Right Arrow
Left Arrow
Back
Patching
Implementation advice for patching
Creating a standard patching process
Report an incident
Default credentials
Right Arrow
Left Arrow
Back
Default credentials
Changing default credentials
Report an incident
Application whitelisting
Right Arrow
Left Arrow
Back
Application whitelisting
Implementing application whitelisting
Report an incident
Implement and test backups
Right Arrow
Left Arrow
Back
Implement and test backups
Backing up your data
Report an incident
Centralised logging
Right Arrow
Left Arrow
Back
Centralised logging
Configuring centralised logging
Report an incident
Report an incident
Guides
Right Arrow
Left Arrow
Back
Guides
Legacy systems
Right Arrow
Left Arrow
Back
Legacy systems
Identifying and managing legacy systems
Mitigating legacy systems
Report an incident
Mobile device management
Right Arrow
Left Arrow
Back
Mobile device management
Managing mobile devices on your network
Report an incident
How to report a vulnerability
Report an incident
Report an incident
Businesses and individuals
Right Arrow
Recent threats
Right Arrow
Left Arrow
Back
Recent threats
Bomb threat emails affecting New Zealanders
Webcam and password blackmail scam
Malware targeting business customers of New Zealand banks
Invoice scams affecting New Zealand businesses
New malware found on routers
Misuse of Cisco devices
RealMe phishing emails
Vulnerabilities in computer processors
Ransomware, called Bad Rabbit, affecting international systems
KRACK attack: Security weaknesses affecting wi-fi enabled devices
Kovter malware being distributed on adult websites
BlueBorne: Security vulnerabilities affecting Bluetooth devices
Onliner Spambot release of 711 million credentials
MPI phishing scam
Email compromise and invoice scam
Webcam blackmail scam
NotPetya ransomware campaign targeting Microsoft Windows computers
Phone scammers claiming to provide WannaCry ransomware support
WannaCry Ransomware used in large scale international attacks
1 billion username and password credentials released
Google Docs phishing attack
Phone scammers claiming to be from CERT NZ
Phone scam affecting businesses and government organisations
Office 365 phishing and credential harvesting campaign
Report an issue
Explore
Right Arrow
Left Arrow
Back
Explore
Credential dumps
Report an issue
Guides
Right Arrow
Left Arrow
Back
Guides
Getting started with cyber security
Right Arrow
Left Arrow
Back
Getting started with cyber security
Top 11 tips for cyber security
How to create a good password
Backing up data and devices
Use two-factor authentication to protect your accounts
Keep your data safe with a password manager
Report an issue
Cyber security and your business
Right Arrow
Left Arrow
Back
Cyber security and your business
Top 11 cyber security tips for your business
Using two-factor authentication (2FA) to secure your business
Backups for your business data
Incident response: planning for when things go wrong
Protecting your business from spear phishing and whaling
Benefits of making your website use HTTPS
Protect your website
Set up logs for your website
Create a password policy for your business
Phishing scams and your business
Create a cyber security policy for your business
Getting a vulnerability report
Report an issue
Stepping up your cyber security
Right Arrow
Left Arrow
Back
Stepping up your cyber security
Secure your home network
Buying a new device
Cyber security and social media
Keeping your mobile phone safe and secure
Shopping online safely
Cryptocurrency security
How the cloud works
Ditch your older device
Report an issue
Report an issue
Report an issue
About
Right Arrow
About us
Quarterly report
Right Arrow
Left Arrow
Back
Quarterly report
Quarter Three Report 2018
Quarter Two Report 2018
Quarter One Report 2018
Quarter Four Report 2017
Quarter Three Report 2017
Quarter Two Report 2017
Our partners
Contact us
Search
Subscribe to updates
Group 18 Copy 6
Created with Sketch.
Twitter updates
Fill 1 Copy 4
Created with Sketch.
Report an issue
>Glossary Term
Name
required
Email
required
Subscription options
Advisories for businesses and individuals
Advisories for technical staff
Cyber Smart updates
Quarterly e-news