Mon-Fri: from 9 a.m. to 7 p.m.
Sat: from 9 a.m. to 6 p.m.
Sun: day off
Mon-Fri: from 9 a.m. to 6 p.m.
Lunch: from 13.00 to 14.00
Sat: from 9.00 to 15.00
Sun: day off
Mon-Thu: from 9 a.m. to 6 p.m.
Lunch: from 13.00 to 14.00
Mon: from 9 a.m. to 5 p.m.
Sat-Sun: day off
Mon-Fri: from 9 a.m. to 7 p.m.
Sat: from 9 a.m. to 6 p.m.
Sun: day off
Mon-Fri: from 9 a.m. to 6 p.m.
Lunch: from 13.00 to 14.00
Sat: from 9.00 to 15.00
Sun: day off
Mon-Thu: from 9 a.m. to 6 p.m.
Lunch: from 13.00 to 14.00
Mon: from 9 a.m. to 5 p.m.
Sat-Sun: day off
Specialists of Cisco Talos warned about the discovery of a large botnet, called VPNFilter. The complex virus has already infected at least half a million Linksys, MikroTik, NETGEAR and TP-link routers, as well as NAS of QNAP production in 54 countries. Researchers emphasize that VPNFilter is the second known IoT-threat that can “survive” a reboot of an infected device, besides it has a destructive functionality.
A list of the device models on which the VPNFilter was found, published by Symantec, can be seen below.
Linksys E1200;
Linksys E2500;
Linksys WRVS4400N;
Mikrotik RouterOS for Cloud Core routers: versions 1016, 1036 and 1072;
Netgear DGN2200;
Netgear R6400;
Netgear R7000;
Netgear R8000;
Netgear WNR1000;
Netgear WNR2000;
QNAP TS251;
QNAP TS439 Pro;
Other QNAP NAS devices running QTS;
TP-Link R600VPN.
Users of potentially vulnerable devices are strongly encouraged to reset to factory settings and then reboot and make sure that the latest software version is used.
With respect to the administration of the TC “Black Sea”