INTERNET OF THINGS (IOT) AND DNS SECURITY: ASIA’s DOUBLE EDGED SWORD

By Nick Itta, EfficientIP’s Vice President of Sales, APAC The single biggest global economic shift…

Trend Micro: Singapore a hotbed for malicious URLs in SEA[1] in 2018; ranks first for business email compromise (BEC)

2018 Annual Security Roundup also sees rising interest in machine learning and artificial intelligence technologies…

How to lose money to (credential) stocking stuffers

Written by Samantha Cruz, Cyber Operations Researcher, Horangi Cyber Security The first quarter of 2019 wasn’t…

McAfee Mobile Threat Report Unveils 550% Increase in Consumer Security Risks Connected to Fake and Malicious Apps in 2018

Company Announces Expanded Partnerships with Samsung and Türk Telekom as Customer Base Grows to Over 530 Million…

Kaspersky Lab helps to eliminate seven vulnerabilities in Industrial IoT Platform solution

Kaspersky Lab experts have helped to identify and patch seven previously unknown vulnerabilities in the…

How to hack a hardware cryptocurrency wallet

Hardware wallets are considered to be the most secure type of cryptocurrency wallet. However, nothing…

Small Business Websites: Keeping Off the Dreaded Blacklist

By Tony Perez, General Manager and Vice President of Security Product Group, GoDaddy A compromised…

The nightmare before Christmas: a third of shoppers have had their financial credentials compromised

Don’t let easy-going holiday shopping hinder your vigilance The time of unrestrained shopping has already…

Cryptojacking shows no signs of slowing down in 2019, says ESET

18 December 2018 – Cases of cryptocurrency mining and cryptojacking will continue to grow in 2019,…

Vulnerabilities in connected electric car chargers could damage home networks 

While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such…

Symantec Unveils Industry’s First Neural Network to Protect Critical Infrastructure from Cyber Warfare

Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day…

Under the Radar: The Future of Undetected Malware in APAC

by Malwarebytes Labs As if you haven’t heard it enough from us, the threat landscape…

Remote access nightmare: amount of malware that is new backdoors increases more than 40% in 2018

Out of all the new malicious files detected in 2018, the amount that turned out…

2018’s malicious crypto-mining fever powered by pirated software and content

The global outbreak in malicious cryptocurrency mining that unfolded in 2018 saw the number of…

False sense of security: more than two-thirds of SMBs claim they can protect their data, but almost half suffer data breaches

Despite a lack of resources and funding, growing companies are achieving great efficiencies by using…