النسخة العربية

Oman National CERT Towards a safe cyber environment

Oman 3rd best Arab country in Cybersecurity Index 2020

Oman 3rd best Arab country in Cybersecurity Index 2020

Oman has been ranked third in the Arab world and 21st globally in the Global Cybersecurity Index 2020 report released by the International Telecommunication Union (ITU).

View
Innovation Hub Oman’s 1st Virtual Hackathon

Innovation Hub Oman’s 1st Virtual Hackathon

Under the theme innovation in Fintech and Cybersecurity, Oman National CERT is partnering with Oman Arab Bank to host Oman’s 1st 24 hours virtual hackathon on 2nd and 3rd April 2021.The registration is open for all students and professionals. Join us by registering at www.oabinnovation.com

View
Safer Internet Day 2021

Safer Internet Day 2021

Safer Internet Day 2021 will take place on Tuesday, 9 February 2021, when - once again - we'll join forces across the globe to work "Together for a better internet".

View
6th National Cybersecurity drill

6th National Cybersecurity drill

The virtual drill is organized by the Ministry of Transport, Communications and Information Technology, represented by Oman National Computer Emergency Readiness Team (OCERT) in cooperation and coordination with the Cyber Defence Centre. Thirty-two government institutions participate in the drill.

View
Oman Hosts the 8th Cybersecurity Drill with the Participation of 25 Countries

Oman Hosts the 8th Cybersecurity Drill with the Participation of 25 Countries

Under the theme "Controlling the cybersecurity risks associated with remote work", the Ministry represented by Oman CERT organize the 8th cybersecurity drill for the Arab countries and the member states of the Organization of Islamic Cooperation, with the participation of 25 Arab and regional countries.

View

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

Articles Library

Articles Library

Category: Email Security

E-mail security threatsAttachments. E-mail attachments are the most frequently used hacking method, so don’t open attach ...

Category: Wireless Security

Wifi or wireless is one of the dominant communication technologies that we commonly use these days. It was first release ...

Category: Networking Security

The Cloud, one of the current technology trends and buzz words which vendors and solution providers are trying to push t ...

Category: Ethical Hacking

Not all hackers do evil work. Here's what you need to know to use your hacking skills to do good. Do viruses, DDoS at ...

Category: Online Child Protection

Quite infinite are currently  the opportunities offered by the world wide web (internet) to people around the world, par ...

Category: Mobile Security

Due to the fact that mobile devices are conveniently light and small but it also makes them more vulnerable to theft or ...

Category: Mobile Security

There are many different security threats when it comes to mobile security, but we’ll try to categorize them to make it ...

Category: Mobile Security

Encryption is the process of converting your personal and confidential information into unreadable format using special ...

Category: Mobile Security

Our children are exposed to many different online material and it’s a good idea to limit them to certain trusted and ...

Category: Mobile Security

Nowadays the big buzz word is “the Cloud”, so what is the Cloud? The Cloud is the use of computing resources (hardw ...

1