Singapore was the top cyberattack target during Trump-Kim Summit: F5 Network

Singapore was the top target of cyberattacks across the globe during the much-hyped Trump-Kim summit which took place from June 11 and 12, according to data collected by F5 Networks, in concert with data partner Loryka. The analysis of data by…

How cryptocurrency is shaping today’s threat environment

How cryptocurrency is shaping today’s threat environment Cryptocurrency has exploded as a popular way to support digital transactions. Since its creation, users have discovered an array of different ways to leverage cryptocurrency, including within mining strategies and digital wallets. Expanded…

New McAfee Survey Reveals 20 Percent of Consumers in Singapore Would Knowingly Buy a Connected Device Vulnerable to Hacking

New McAfee Survey Reveals 20 Percent of Consumers in Singapore Would Knowingly Buy a Connected Device Vulnerable to Hacking Drones, Digital Assistants, and Connected Toys Top the List of Most Hackable Devices this Holiday Season NEWS HIGHLIGHTS ·         Survey reveals…

90% of Consumers Think Security Should be Built into Connected Devices

90% of Consumers Think Security Should be Built into Connected Devices New global IoT security survey by Irdeto finds that awareness of cyberattacks targeting smart devices increases with age LAS VEGAS, BLACK HAT – 26 July 2017 – IoT security is top-of-mind…

Macron Campaign Hacking During The French Presidential Election

Cybercriminals’ interference and efforts to undermine the electoral process is becoming a trend. France’s newly elected president, Emmanuel Macron, is the latest victim to experience such malicious attacks, resulting in a massive leak of documents one day before the French presidential election. This follows…

Signs you have been hacked

Signs you have been hacked By: Gene Ng, IBM ASEAN Security Lead If you still believe that your enterprise is safe from cyber threats and that your data is secure, you might be in for a rude shock. 2016 was…

Data Protection Mishap Leaves 55M Philippine Voters at Risk

After a massive data breach leaked the entire database of the Philippines’ Commission on Elections (COMELEC), every registered voter in the Philippines is now susceptible to fraud and other risks. While initial reports have downplayed the impact of the leak, Trend Micro…

How Safe is Your Mobile Phone? Selection of UX focused Mobile Apps by NordVPN Offers Ultimate Protection

How Safe is Your Mobile Phone? Selection of UX focused Mobile Apps by NordVPN Offers Ultimate Protection NordVPN launches user-friendly mobile apps to protect users from data snooping, hacking and theft March 29, 2016. People rely on their mobile phones…

Intel Security Reveals “Most Hackable Holiday Gifts” of 2015

Intel Security developed its Most Hackable Holiday Gifts list to identify popular tech gifts and some of the common security risks that could compromise personal data if devices are not properly secured. This list aims to educate and protect consumers from…

Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals

Trend Micro Report finds that Corporate Data is the Pot of Gold at the end of the rainbow for cybercriminals Cybercriminals adopt new targeted attack techniques and assaults that threaten target networks. Singapore, April. 16 2015 – In Trend Micro’s…

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities Trend Micro’s H1 2014 Targeted Attack Trends Report finds that threat actors are still largely able to avoid detection by refining their targeted attack methods Singapore,…

Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data

Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data 5 August 2014 – Backdoors let attackers control unprotected computers from just about any network, including public, home, and office systems. Taking advantage of a backdoor’s techniques—the actions backdoors…

Victim Insights around the Russian Hack

Victim Insights around the Russian Hack 7 August 2014 – The recently disclosed Russian hack in which a Russian cyber gang stole billions of passwords from both commercial websites and consumers highlights the challenges we all face in our day to day activities on…

POLICE ARREST HACKER AND VANDALS

POLICE ARREST HACKER AND VANDALS Police have arrested a 35-year-old Singaporean man for the recent series of hacking incidents into the websites of the Ang Mo Kio Town Council, the Straits Times Blog, People’s Action Party Community Foundation (PCF) and…

Hacker redirected University’s Internet network to MEATSPIN – Tips to secure network

A student at Florida State University Panama City hacked into his school’s network and redirected users to meatspin.com upon entering their browsers. In case you don’t know what the website is all about, let us sum it up for you…