Cybercriminals Archives - Page 2 of 2 - The Tech Revolutionist
Exploiting Data Breaches

Exploiting Data Breaches By Michael Marriott, Digital Shadows security expert High profile data breaches are regularly in the news and, seemingly, businesses and are losing the battle to protect their intellectual property (IP), corporate, and customer data from the threats…

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams

Trend Micro 1H Security Roundup Report Showcases Evolution of Ransomware and BEC Scams SINGAPORE, August 24, 2016 – As Trend Micro predicted, 2016 has proven to be a year of online extortion through various malicious attack methods. Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader…

Intel Security Study Reveals 40 Percent of Singapore Travelers Will Risk Using An Unsecured Wi-Fi Connection

Intel Security Study Reveals 40 Percent of Singapore Travelers Will Risk Using An Unsecured Wi-Fi Connection Email, Geo-Tagging and Social Media Activities Can Jeopardize Consumers’ Security While Travelling   NEWS HIGHLIGHTS ·       The survey challenges a misconception that millennials are least…

The Panamanian Shell Game: Cybercriminals With Offshore Bank Accounts?

The recent Panana Papers leak revealed high profile politicians, businessmen and other prominent individuals that were utilizing offshore organizations to cut off tax payment. This then led to the question – would cybercriminals too, utilize offshore organizations to facilitate their activities? According…

Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature

Verizon’s 2016 Data Breach Investigations Report finds cybercriminals are exploiting human nature April 27, New York – Cybercriminals are continuing to exploit human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware,…

Microsoft Security Announcements Update

Here’s a quick recap of Microsoft’s recent security announcements, including those at the recently concluded RSA 2016, as well as news of the milestone opening of a Cybercrime Satellite Center in Korea – our 5th in Asia, and 7th globally. 1.     Microsoft Launches…

Prototype Nation, The Chinese Cybercriminal Underground in 2015

By the end of 2013, the Chinese cybercrime underground was a very busy economy, with peddled wares that not only targeted PCs, but mobile devices as well—making it its most prolific segment. We also saw cybercriminals abusing popular Web services such…

Trend Micro Casts Light into the Shadows of the Deep Web

Approximately 400 times larger than the visible Web, the Deep Web is also home to many of the Internet’s illicit activities such as identity theft, doxing, firearm trading and employing contract killers. Some may be familiar with the “Dark Web” or “darknets”: but these are…

Nigerian Cybercriminals Use a Cheap and Simple Keylogger to Prey on SMBs Worldwide

Social engineering is emerging as one of the most prolific and effective methods that cybercriminals use to deceive victims, and now it’s being leveraged by scammers, traditionally reliant on basic spamming emails, who are evolving to more sophisticated methods. In…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"