Vulnerabilities in connected electric car chargers could damage home networks 

While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected. Kaspersky Lab experts have discovered that electric vehicle (EV) chargers supplied by a major vendor carry vulnerabilities that…

Browser is the new endpoint

By Rajesh Ranganathan, Product Manager, ManageEngine Asked to name their critical network endpoints, most IT pros would cite mobile devices, laptops, desktops, and servers. A few might include wearables and other emerging end-user hardware. Browsers, though, probably wouldn’t make the…

Pet trackers might have more ‘bite’ than animal lovers realize, says Kaspersky Lab

Pet trackers might have more ‘bite’ than animal lovers realize, says Kaspersky Lab As everything, including our pets, begin to take on a digital element, securing connected devices and their networks will be key to keeping, not just our information,…

Gartner Provides Seven Steps Security Leaders Can Take to Deal With Spectre and Meltdown

Gartner Provides Seven Steps Security Leaders Can Take to Deal With Spectre and Meltdown SINGAPORE, February 15, 2018 — Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities,…

Meltdown and Spectre Intel Processor Vulnerabilities: What You Need to Know

Meltdown and Spectre Intel Processor Vulnerabilities: What You Need to Know Microsoft, Linux, Google, and Apple started rolling out patches addressing design flaws in processor chips that security researchers named Meltdown and Spectre. Here’s what you need to know about…

Fixing the Meltdown and Spectre vulnerabilities

Fixing the Meltdown and Spectre vulnerabilities Two days ago, Graz University of Technology published a paper https://spectreattack.com/ describing a pair of attacks on common microprocessors.  The underlying vulnerability affects Intel, AMD, and ARM processors. All contemporary microprocessors pre-execute instructions.  In…

Monero-mining malware exploits Microsoft vulnerability

Monero-mining malware exploits Microsoft vulnerability ESET urges Windows Server 2003 users to apply security updates to avoid falling victim to the latest cryptocurrency miner attack ESET, a leading global cyber security company, has discovered a new threat whereby attackers infected…

NSFOCUS solutions now available in AliCloud Marketplace

NSFOCUS solutions now available in AliCloud Marketplace AliCloud offers first ICSA and Veracode certified Web Application Firewall powered by NSFOCUS to secure more than 2 million customers SINGAPORE, August 25, 2017 – NSFOCUS, the leader in holistic hybrid security solutions, is now…

Symantec comments on Petya Ransomware Attacks

A new strain of Petya ransomware has struck Europe and is spreading around the world, affecting many organizations. Symantec has confirmed that the Petya ransomware, like WannaCry, is using an EternalBlue exploit to spread, and has published an update on its blog, including…

IBM X-FORCE Finds Historic Number of Records Leaked and Vulnerabilities Disclosed in 2016

IBM X-FORCE Finds Historic Number of Records Leaked and Vulnerabilities Disclosed in 2016Cybercriminals Begin to Harvest Unstructured Data, Spam Skyrockets 400 Percent as Ransomware Runs Rampant CAMBRIDGE, MA – March 29, 2017 –IBM Security today announced results from the 2017…

INTEL SECURITY HIGHLIGHTS VULNERABILITIES OF THE ‘SMART FUTURE’

INTEL SECURITY HIGHLIGHTS VULNERABILITIES OF THE ‘SMART FUTURE’ Global security company reveals vulnerabilities of dead apps in app store News Highlights: ·      2 in 5 people in Singapore do not know how to check if their connected devices have been compromised…

Expanded Carbon Black and IBM Partnership Delivers New Technology to Identify and Patch Most Critical Endpoint Vulnerabilities in Seconds

Expanded Carbon Black and IBM Partnership Delivers New Technology to Identify and Patch Most Critical Endpoint Vulnerabilities in Seconds IBM Security to Resell Carbon Black SINGAPORE – October 10, 2016 — Carbon Black, the leader in next-generation endpoint security, today announced an expansion…

Trend Micro discovers two critical vulnerabilities affecting QuickTime for Windows

Apple is pulling support for QuickTime for Windows on the heels of Trend Micro’s Zero Day Initiative’s discovery of two new, critical vulnerabilities affecting the software. Detailed in this blog post, these are remote code execution vulnerabilities that could allow an attacker…

Data Protection Mishap Leaves 55M Philippine Voters at Risk

After a massive data breach leaked the entire database of the Philippines’ Commission on Elections (COMELEC), every registered voter in the Philippines is now susceptible to fraud and other risks. While initial reports have downplayed the impact of the leak, Trend Micro…

Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground

Trend Micro 2015 Security Roundup Details Top Breaches, Vulnerabilities and Cyber Underground Singapore, March 9, 2016 – Today, Trend Micro Incorporated (TYO: 4704; TSE: 4704) released its annual security roundup report,“Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies,” which dissects the most significant security…