Antimalware Day: Genesis of viruses… and computer defense techniques SINGAPORE, 3 November 2017 – On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used…
Monero-mining malware exploits Microsoft vulnerability
Monero-mining malware exploits Microsoft vulnerability ESET urges Windows Server 2003 users to apply security updates to avoid falling victim to the latest cryptocurrency miner attack ESET, a leading global cyber security company, has discovered a new threat whereby attackers infected…
Singapore among Asian countries with lowest malware encounter rates, despite high concentration of malware hosting sites – Microsoft Report
Singapore among Asian countries with lowest malware encounter rates, despite high concentration of malware hosting sites – Microsoft Report The latest Microsoft Security Intelligence Report, Volume 22, revealed that emerging countries in Asia still among the most vulnerable to malware…
How to protect your data from system failure or ransomware
How to protect your data from system failure or ransomware MOAR cat videos, less stress Singaporeans are a technology-savvy bunch. With a population of approximately 5.74-million, we have an internet penetration of 82% and spend more than 7 hours per…
Statistics and Development of the WannaCry Ransomware
Nick Savvides, Security Advocate at Symantec Asia Pacific and Japan When did WannaCry appear and how quickly did it spread? WannaCry first appeared on Friday, May 12. Symantec saw a dramatic upsurge in the number of attempts to exploit the…
WannaCry/Wcry Ransomware: How to Defend against It
WannaCry/Wcry Ransomware: How to Defend against It An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The culprit: the WannaCry/WCry ransomware (detected by Trend Micro as RANSOM_WANA.A and RANSOM_WCRY.I). Trend Micro has been tracking WannaCry since its emergence…
Retarus boosts E-Mail Security Services in South East Asia
Patient Zero Detection for the timely detection of malware and efficient IT forensics Retarus boosts E-Mail Security Services in South East Asia Singapore, 1 February 2017 – Global information logistics provider Retarus continues to expand the scope of functions provided by its E-Mail…
Siemens expands collaboration with Intel Security for industrial security solutions
Siemens expands collaboration with Intel Security for industrial security solutions · Siemens is leveraging Intel Security solutions for its Plant Data Services · Provides early detection of threats and recommendations for counter-measures Singapore, March 8, 2016 — Siemens and Intel…
Trend Micro : Android-based Smart TVs Hit By Backdoor Spread Via Malicious App
With the year-end shopping season over, many consumers now have various new smart gadgets in their homes – one particularly popular gadget being smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well.…
Trend Micro Discovers MalumPoS; Targets Hotels and other Industries
Trend Micro researchers have discovered MalumPoS, a new PoS attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS® – a platform…
Messaging Application LINE Used as a Decoy for Targeted Attack
According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…
MBR Wiper Attacks Strike Korean Power Plant
In recent weeks, a major Korean electric utility has been affected by destructive malware, which was designed to wipe the master boot records (MBRs) of affected systems. It is believed that this MBR wiper arrived at the target systems in…
Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques
Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques Shellshock revelation, new attacks against mobile and web platforms dissected in quarterly report Singapore, Dec. 3, 2014 – The third quarter saw a significant event with the new critical vulnerability, known as…