Managing Windows XP’s Risks in a Post Support World

By David Siah, Country Manager, Trend Micro Singapore On April 8, Windows XP will stop receiving support from Microsoft. This ends the lifespan of one of Microsoft’s most successful and long-running operating systems. Rarely has a tech product lasted as…

Samsung and PayPal allow consumers to shop and pay with fingerprint authentication on new Samsung GALAXY S5 LTE

Samsung GALAXY S5 LTE users can easily and securely shop password-free on their mobile with millions of merchants that accept PayPal Singapore – 27 March 2014 – Samsung and PayPal announced a collaboration that will allow Samsung GALAXY S5 LTE…

Don’t be exposed when support for Windows XP Ends on 8 April 2014

Still own a Windows XP machine at home? Microsoft launches two free tools to help consumers migrate from Windows XP SINGAPORE, 17 March 2014 – Microsoft today reminded consumers that it will be ending its support for Windows XP operating…

Gmail Will be Protected by Encryption

20 March 2014 – Google announced that Gmail users will be protected by encryption in all the emails they send.  According to Google, whenever an user checks or sends an email, the webpage will be secured by HTTPS connection. Even…

WhatsApp CEO: We won’t compromise your privacy for Facebook

Since Facebook acquired Whatsapp, there has been fears that privacy of users and conversations would be compromised. According to CNET, in a blog post, WhatsApp CEO Jan Koum reiterated that his hit messaging application will not bend to its soon-to-be overlords…

Gemalto hosted TSM service strengthens mobile payment ecosystem in HK

The solution, also operated by Gemalto, is open to all service providers and already enables Hang Seng Bank to connect into Hong Kong’s TSM trust infrastructure Singapore – Mar 13, 2014 – Gemalto (Euronext NL0000400653), the world leader in digital security, has…

Trend Micro CEO Eva Chen Named One of Forbes Asia’s 50 Power Businesswomen for the Third Consecutive Year

Singapore, March 7, 2014 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software and solutions, today announced that Eva Chen, CEO and Co-founder of Trend Micro, was named one of Forbes Asia’s 50 Power Businesswomen, 2014, winning this accolade for…

Garanti deploys NFC services on microSD with Gemalto solution

Singapore – March 5, 2014 – Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, is supplying its Optelio Contactless microSD to Garanti, a leading financial institution in Turkey, to support their rollout of mobile contactless services. The company will further provide Garanti…

Apple’s iOS is vulnerable! Modified charger can inject malware into your iPhone

According to foreign media reports, even though Apple has chose to close up their OS development system for iOS, this does not completely deter malicious applications from being installed on iPhones. U.S. cyber security experts found out that Apple iPhone’s…

Evernote introduces New Security Features

Evernote’s just made three new security features available: Two-Step Verification Access History Authorized Applications Two-Step Verification Each new device you sign in to Evernote with will now require the use of an authentication code to verify that it is really…

Hacker redirected University’s Internet network to MEATSPIN – Tips to secure network

A student at Florida State University Panama City hacked into his school’s network and redirected users to meatspin.com upon entering their browsers. In case you don’t know what the website is all about, let us sum it up for you…

Antivirus Software Coverage @ IT SHOW 2013

 Windows 8 great built in Antivirus technologies and already preinstalled software such as Windows Defender to prevent your computer from infecting malicious software virus. If you think Windows Defender is still not good enough and wishes to look for…

[Technical Overview] UEFI VS Traditional BIOS Boot : What it means to you?

Overview This article researches into the advent of vulnerabilities within Operating System boot processes. Specifically, the document focuses on the BIOS and UEFI boot processes and the vulnerabilities found within the implementations. The document then explains why the UEFI boot…