Defeating Cybersecurity Through Hacking? First Internationally Certified Singaporean Firm Drives Up Security Standards Cybercrimes have nearly doubled between 2014 and 2016, rising from 7.9% to 13.7% of all crimes, according to the inaugural Singapore Cyber Landscape report. PwC’s Global State…
Don’t Analyse Everything – Analyse the Right Thing to Detect and Respond to Insider Threats
Don’t Analyse Everything – Analyse the Right Thing to Detect and Respond to Insider Threats Jeffrey Kok, Director of Pre-Sales, Asia Pacific and Japan In 2013, organizations worldwide started to take insider threats seriously, thanks to a man named Edward…
Hillstone Networks Security Innovations honored with Two Awards in the 5th Annual 2017 Cyber Defense Magazine InfoSec Awards
Hillstone Networks Security Innovations honored with Two Awards in the 5thAnnual 2017 Cyber Defense Magazine InfoSec Awards Recognizing Innovation During the RSA® Conference 2017 Singapore- February 16th, 2017– Hillstone Networks announced today that Cyber Defense Magazine, the industry’s leading electronic…
CA Technologies Wins Governance, Risk & Compliance Solution Award for Third Consecutive Year
CA Technologies Wins Governance, Risk & Compliance Solution Award for Third Consecutive Year Accolade by NetworkWorld Asia Information Management Awards 2016 underscores CA Technologies Leadership in Information Security in Asia Pacific & Japan SINGAPORE, June 9, 2016 – CA Technologies (NASDAQ: CA) today…
Lenovo is getting sued due to Superfish Adware
Lenovo is getting sued because of the controversial Superfish adware which is preinstalled in some of their devices. Lenovo and the developers of Superfish are now facing court trials. Superfish will install bookmarks in the infected computer and insert advertisement…
MBR Wiper Attacks Strike Korean Power Plant
In recent weeks, a major Korean electric utility has been affected by destructive malware, which was designed to wipe the master boot records (MBRs) of affected systems. It is believed that this MBR wiper arrived at the target systems in…
Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities
Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities Trend Micro’s H1 2014 Targeted Attack Trends Report finds that threat actors are still largely able to avoid detection by refining their targeted attack methods Singapore,…
Trend Micro Predicts the Rise of Targeted Attacks Across the APAC Region in 2015
Trend Micro Predicts the Rise of Targeted Attacks Across the APAC Region in 2015 Annual prediction report from cybersecurity leader reveals that retail and financial institutions outside of the US will feel the wrath of cybercriminals in 2015 Singapore, November…
[Trend Micro Media Alert] Shellshock emerges in the wild, possibly larger than Heartbleed
Just several hours after the news of Shellshock (covered under CVE-2014-7169) breaking out; it was reportedly being exploited in the wild already. Possibly even larger in scope than Heartbleed, the severity of this vulnerability is serious given that web servers are mostly…
CLOUDSEC 2014 Addresses The Internet of Everything and its Key Security Issues
Annual security conference gathers global and regional experts to share their thoughts on navigating the future landscape of an Internet-Connected society Singapore, 3 September 2014 – CLOUDSEC, one of the leading internet security conferences in Asia Pacific, kicks off…
Trend Micro’s Q2 Security Round-up Highlights Need for Comprehensive Cybersecurity Strategy to Keep Information Secure
Trend Micro’s Q2 Security Round-up Highlights Need for Comprehensive Cybersecurity Strategy to Keep Information Secure Heartbleed, Windows XP and Adobe Flash expose systemic shortcomings Singapore, August 13, 2014 – Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the…
Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data
Trend Micro Identifies 8 Backdoor Techniques that Attackers Use to Steal Company Data 5 August 2014 – Backdoors let attackers control unprotected computers from just about any network, including public, home, and office systems. Taking advantage of a backdoor’s techniques—the…
Trend Micro: Threats Roundup 2014
Trend Micro has conducted a summary on the threats in the world of technology. In light of the recent highlight on the Heartbleed bug incident, consumers and corporations could not be too careful when it comes to security. As a…
Mcafee Releases Free Tool To Check For Heartbleed Affected Websites
Santa Clara, Calif. / SINGAPORE, April 14th 2014 – Today McAfee, part of Intel Security, released a free tool to help consumers easily gauge their susceptibility to the potentially dangerous effects of the Heartbleed Bug, a vulnerability in OpenSSL that has placed millions…
Gmail Will be Protected by Encryption
20 March 2014 – Google announced that Gmail users will be protected by encryption in all the emails they send. According to Google, whenever an user checks or sends an email, the webpage will be secured by HTTPS connection. Even…