A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Give your website a premium touchup with these free WordPress themes using responsive design, seo friendly designs www.bigtheme.net/wordpress
Home / Home / report incidents

report incidents

Incident Response

A cyber incident is the violation of an explicit or implied security policy. In general, types of activity that are commonly recognized as being in violation of a typical security policy. We encourage you to report any activities that you feel meet the criteria for an incident or phishing attack. Note that our policy is to keep any information specific to your site confidential unless we receive your permission to release that information.

  • Attempts to gain unauthorized access to a system or its data
  • Unwanted disruption or denial of service
  • Unauthorized use of a system for processing or storing data
  • Changes to system hardware, firmware, or software characteristics without the owner’s knowledge, instruction, or consent
  • Attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques

Submit Malware or Report a Vulnerability.

Malware refers to software programs designed to damage or perform other unwanted actions on a computer system. Examples of malware are viruses, worms, Trojan horses, and spyware. DHS performs analysis of malware and software vulnerabilities and can provide actionable information on how to better protect information systems.