Antimalware Day: Genesis of viruses… and computer defense techniques

Antimalware Day: Genesis of viruses… and computer defense techniques SINGAPORE, 3 November 2017 – On November 3, 1983, Frederick Cohen, a student at the engineering school of the University of Southern California (USC), was sure that a malicious program could be used…

Monero-mining malware exploits Microsoft vulnerability

Monero-mining malware exploits Microsoft vulnerability ESET urges Windows Server 2003 users to apply security updates to avoid falling victim to the latest cryptocurrency miner attack ESET, a leading global cyber security company, has discovered a new threat whereby attackers infected…

Singapore among Asian countries with lowest malware encounter rates, despite high concentration of malware hosting sites – Microsoft Report

Singapore among Asian countries with lowest malware encounter rates, despite high concentration of malware hosting sites – Microsoft Report The latest Microsoft Security Intelligence Report, Volume 22, revealed that emerging countries in Asia still among the most vulnerable to malware…

How to protect your data from system failure or ransomware

How to protect your data from system failure or ransomware MOAR cat videos, less stress Singaporeans are a technology-savvy bunch. With a population of approximately 5.74-million, we have an internet penetration of 82% and spend more than 7 hours per…

Statistics and Development of the WannaCry Ransomware

Nick Savvides, Security Advocate at Symantec Asia Pacific and Japan When did WannaCry appear and how quickly did it spread? WannaCry first appeared on Friday, May 12. Symantec saw a dramatic upsurge in the number of attempts to exploit the…

WannaCry/Wcry Ransomware: How to Defend against It

WannaCry/Wcry Ransomware: How to Defend against It An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The culprit: the WannaCry/WCry ransomware (detected by Trend Micro as RANSOM_WANA.A and RANSOM_WCRY.I). Trend Micro has been tracking WannaCry since its emergence…

Retarus boosts E-Mail Security Services in South East Asia

Patient Zero Detection for the timely detection of malware and efficient IT forensics  Retarus boosts E-Mail Security Services in South East Asia Singapore, 1 February 2017 – Global information logistics provider Retarus continues to expand the scope of functions provided by its E-Mail…

Siemens expands collaboration with Intel Security for industrial security solutions

Siemens expands collaboration with Intel Security for industrial security solutions ·    Siemens is leveraging Intel Security solutions for its Plant Data Services ·    Provides early detection of threats and recommendations for counter-measures Singapore, March 8, 2016 — Siemens and Intel…

Trend Micro : Android-based Smart TVs Hit By Backdoor Spread Via Malicious App

With the year-end shopping season over, many consumers now have various new smart gadgets in their homes – one particularly popular gadget being smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well.…

Trend Micro Discovers MalumPoS; Targets Hotels and other Industries

Trend Micro researchers have discovered MalumPoS, a new PoS attack tool that threat actors can reconfigure to breach any PoS system they wish to target. Currently, it is designed to collect data from PoS systems running on Oracle® MICROS® – a platform…

Messaging Application LINE Used as a Decoy for Targeted Attack

According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…

MBR Wiper Attacks Strike Korean Power Plant

In recent weeks, a major Korean electric utility has been affected by destructive malware, which was designed to wipe the master boot records (MBRs) of affected systems. It is believed that this MBR wiper arrived at the target systems in…

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques Shellshock revelation, new attacks against mobile and web platforms dissected in quarterly report   Singapore, Dec. 3, 2014 – The third quarter saw a significant event with the new critical vulnerability, known as…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"