Hillstone Networks Selects Lastline to Provide Advanced Malware Detection Hillstone joins growing community of high-profile cybersecurity vendors that integrates Lastline to provide comprehensive threat protection Singapore, June 7, 2017– Hillstone Networks, a leading provider of network security solutions, and Lastline Inc, the leader…
Malware Rates in Thailand: Why You are at Risk.
Malware Rates in Thailand: Why You are at Risk. Sean Allan, Digital Marketing Manager, Aware Every year for the past two decades’ incidents of cybercrime have increased year-on-year worldwide. Recent studies expect this trend to continue, with cyber security costs…
93 Percent of Cybersecurity Researchers Say Non-Malware Attacks Pose More Risk to Businesses than Commodity Malware, Carbon Black Research Finds
93 Percent of Cybersecurity Researchers Say Non-Malware Attacks Pose More Risk to Businesses than Commodity Malware, Carbon Black Research Finds 87 percent of cybersecurity researchers say they don’t yet trust artificial intelligence (AI) and machine learning (ML) to replace human…
Malwarebytes Releases Asia Pacific State of Malware Report
Malwarebytes Releases Asia Pacific State of Malware Report Asia Pacific a Hotbed for Android Malware, Botnets and Banking Trojans SINGAPORE – March 27, 2017 – Malwarebytes™, the leading advanced malware prevention and remediation solution, today in conjunction with the launch of their…
New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe
New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe Close to 40 Percent of Cloud Services Are Commissioned Without the Involvement of IT, Leading to More Security Risk for Companies NEWS HIGHLIGHTS · …
Carbon Black’s Breakthrough ‘Streaming Prevention’ Leapfrogs Cylance, McAfee and Symantec by Stopping Both Malware and Non-Malware Attacks
Carbon Black’s Breakthrough ‘Streaming Prevention’ Leapfrogs Cylance, McAfee and Symantec by Stopping Both Malware and Non-Malware Attacks ‘Streaming Prevention’ stops more attacks than traditional and machine-learning antivirus (AV), which only stop commodity malware SINGAPORE — February 7, 2017—Carbon Black, the…
One in Five Computers in Singapore Reported a Malware Encounter in 2Q2016: Microsoft Report
One in Five Computers in Singapore Reported a Malware Encounter in 2Q2016: Microsoft Report According to findings from the Microsoft Security Intelligence Report, Volume 21, Asia Pacific’s emerging markets were also among the most vulnerable to malware threats SINGAPORE, 6…
Five trends for better business communication in 2017
“What matters is that the information arrives.”Five trends for better business communication in 2017 Singapore, 15.12.16 – A secure and efficient flow of information between companies, partners and customers contributes significantly to success in business. Global information logistics expert Retarus…
Pokémon Go: Real World Risks of Apps
As the virtual and physical realms collide, the chances of them converging in serious and dangerous methods increases. This is best exemplified by Pokemon GO, Nintendo’s latest smartphone game addition to the widely acclaimed and popular Pokemon franchise. The game employs…
Malware, data theft, and scams: researchers expose risks of free livestreaming websites
Malware, data theft, and scams: researchers expose risks of free livestreaming websites Millions of people use free livestreaming websites to watch sports and other live events online, but this comes with a considerable security risk. Researchers from KU Leuven-iMinds (Belgium)…
Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions of Users in 2015
Dell Annual Threat Report Reveals Cyber Criminals Using Aggressive, Shape-Shifting Threat Tactics; 50% Surge in Encrypted Traffic Affected Millions of Users in 2015 · Exploit kits evolved with alarming speed, heightened stealth and novel shape-shifting abilities · Secure Sockets Layer/Transport Layer…
Trend Micro Casts Light into the Shadows of the Deep Web
Approximately 400 times larger than the visible Web, the Deep Web is also home to many of the Internet’s illicit activities such as identity theft, doxing, firearm trading and employing contract killers. Some may be familiar with the “Dark Web” or “darknets”: but these are…
Trend Micro Discovers MalumPoS; Targets Hotels and other Industries
Trend Micro researchers have discovered MalumPoS, a new PoS attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS® – a platform…
Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats
Trend Micro Q1 2015 Roundup Sees a Resurgence of Old Threats Indicating possible complacency amongst security professionals SINGAPORE, May 20, 2015 – In the first quarter of 2015, Trend Micro Incorporated’s (TYO: 4704; TSE: 4704) quarterly threat roundup report saw the rise of reemerging…
Messaging Application LINE Used as a Decoy for Targeted Attack
According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…