90% of Consumers Think Security Should be Built into Connected Devices

90% of Consumers Think Security Should be Built into Connected Devices New global IoT security survey by Irdeto finds that awareness of cyberattacks targeting smart devices increases with age LAS VEGAS, BLACK HAT – 26 July 2017 – IoT security is top-of-mind…

Who benefits from cyber-attacks?

Who benefits from cyber-attacks? By: Philippe Very, PhD, Head of the “Management and Strategy” Faculty and Professor of Strategy of EDHEC Business School Philippe Very, PhD, is professor of strategic management and head of faculty at EDHEC Business School, France. He is…

Singapore companies are unprepared for cyber attacks, a survey by Quann reveals

Singapore companies are unprepared for cyber attacks, a survey by Quann reveals Almost all (91%) of the surveyed Singapore companies are in the early stages of security preparedness More than half (54 percent) of the Singaporean respondents do not have…

Cb Response Defends South Korean Special Prosecutor’s Office from Targeted Cyberattacks During Impeachment of Former President Park Geun-hye

Cb Response Defends South Korean Special Prosecutor’s Office from Targeted Cyberattacks During Impeachment of Former President Park Geun-hye Naru Security leverages Carbon Black’s market leading EDR solution to identify malicious activity and catch attempted data exfiltration SINGAPORE—May 17, 2017—Carbon Black,…

From carjacking to car hacking: The real danger of cyber attacks on cars

Grand theft auto has come a long way. A crook does not need a gun or a crowbar to steal a car. With some technical know how and an internet connection, a thief could unlock a car, or even disable…

Can Internet of Things be the New Frontier for Cyber Extortion?

Did you know that despite being equipped with new applications and hardware, most Internet of Things (IoT) devices are furnished with outdated connection protocols and operating systems (OS)? (this is good) When exploited, it can open up the device to remote access by hackers.…

Trend Micro Survey Reveals Less Than 1 in 10 APAC Companies Fully Understand How Cyber Attacks Are Performed

Trend Micro Survey Reveals Less Than 1 in 10 APAC Companies Fully Understand How Cyber Attacks Are Performed ·         Online survey conducted in eight countries across APAC discovers that 59 percent of companies attribute “employees’ lack of cyber security knowledge” as the biggest…

BT AND INTEL SECURITY COLLABORATE TO DEVELOP NEXT GENERATION SECURITY SERVICES

BT and Intel SECURITY COLLABORATE TO DEVELOP next generation security services Singapore, March 8, 2016 — BT and Intel Security today announced a strategic agreement to create new solutions to help organisations improve security and prevent cyber-attacks. The companies will…

HP Study Reveals Smartwatches Vulnerable to Attack

HP Study Reveals Smartwatches Vulnerable to Attack HP Fortify finds 100 percent of tested smartwatches exhibit security flaws, provides guidance for secure device use SINGAPORE, July 30, 2015 – As part of an ongoing series looking at Internet of Things…

Operation Tropic Trooper: Old vulnerabilities still pack a mean punch to government and military institutions in APAC

Despite the ongoing trend of cyberattacks in the region, some governments and companies are proving to be behind the curve when it comes to using proactive methods and technologies like vulnerability patching, security training, and antimalware detection to protect themselves. Taiwan and…

Messaging Application LINE Used as a Decoy for Targeted Attack

According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…

© 2018 THE TECH REVOLUTIONIST - T05 TECHNOLOGIES PTE. LTD. ALL RIGHTS RESERVED.