cyberattacks Archives - Page 2 of 2 - The Tech Revolutionist
What Is a Non-Malware (or Fileless) Attack?

What Is a Non-Malware (or Fileless) Attack? Kane Lightowler, Managing Director, Asia Pacific & Japan, Carbon Black Virtually every organization was targeted by a non-malware attack in 2016, and this year will be no different. The global emergence and continued…

NEC provides cyber-defense training for government agencies in Malaysia to enhance effectiveness in tackling cyber-attacks

NEC provides cyber-defense training for government agencies in Malaysia to enhance effectiveness in tackling cyber-attacks Tokyo, Japan – March 7, 2017 – NEC Corporation (NEC; TSE: 6701) today announced that it has provided government agencies in Malaysia with hands-on cyber-defense training. More than…

NEC to Provide Cyber-Attack Defense Training for Six ASEAN Countries

NEC to Provide Cyber-Attack Defense Training for Six ASEAN Countries Tokyo, February 17, 2017 – NEC Corporation (NEC; TSE: 6701) today announced that it received an order from the Japan International Cooperation Agency (JICA) to provided cyber-attack defense for officials from governmental institutions responsible…

Symantec Research Finds IoT Devices Increasingly Used to Carry out DDoS Attacks

Symantec Research Finds IoT Devices Increasingly Used to Carry out DDoS Attacks Targeted IoT Devices Include Home Networks, Routers, Modems, CCTV Systems and Industrial Control Systems SINGAPORE – September 23, 2016 – Symantec Corp. (NASDAQ: SYMC), the global leader in cyber security,…

CA Technologies Enhances Industry’s Most Comprehensive Privileged Access Management Portfolio, Reducing Risk of Data Breaches at Both Network and Server

CA Technologies Enhances Industry’s Most Comprehensive Privileged Access Management Portfolio, Reducing Risk of Data Breaches at Both Network and Server Integrated Solution Provides End-to-End Control of Privileged Identities Across the Hybrid Enterprise   SINGAPORE, 17 August, 2016 – CA Technologies (NASDAQ: CA) has…

Staying protected on your quest to become a Pokemon master

Staying protected on your quest to become a Pokemon master Chances are, you’ve already heard about Pokemon Go and may have already tried to download it. In a short amount of time, the mobile game has become a global sensation,…

Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House

This year, the North Atlantic Treaty Organization (NATO) members and the White House are the newest targets of the long-running APT campaign Operation Pawn Storm, along with an introduction of new infrastructure. Latest intelligence as a follow-up to Trend Micro’s October…

Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations

Trend Micro’s 2014 Security Roundup Highlights the Terrible Cost of Cyberattacks for Organisations Complacency is no longer an option in 2015 for enterprise cybersecurity SINGAPORE, March 10, 2015 – Trend Micro Incorporated (TYO: 4704; TSE:4704) today announced its 2014 Annual Security Roundup Report, titled “The High…

Trend Micro uncovers unique cyberattacks against Israel and Egypt

Trend Micro’s Forward Threat Research team in conjunction with the United States Air Force has uncovered a new series of attacks against Israeli and Egyptian targets in a report coined “Operation Arid Viper: Bypassing the Iron Dome.” This attack is…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"