Cyber Security

Cybersecurity Forecast 2019: What should we be looking at?

Prediction No. 1: Business Emails with Nasty Surprises, Attached Businesses are quickly becoming cybercriminals’ favoured targets. Over $US12 billion worldwide has been stolen over the past five years due to business email compromise. As the theft of passwords and login details becomes increasingly common in enterprise environments, attackers have grown more confident and motivated, targeting […]

Cyber Security

Cyber Security | Experts point out that web browsers are more vulnerable to malware

With the rise to popularity of browser-based web applications in providing efficiency and driving collaboration to the office workspace, as well as managing critical workloads in businesses. Web browsers like Google Chrome, FireFox, and many others have been targeted by cyber criminals. A lot of people may not be aware of it but web browsers […]

Cyber Security

CYBER SECURITY | New malware can survive even on reinstalled OS, wiped-out HDD/SSD

Slovak based IT security company, ESET, has recently confirmed the existence of a dangerous malware, dubbed LoJax, that infects a targeted computer by re-writing the Unified Extensible Firmware Interface (UEFI) which is located in the motherboard’s flash memory, allowing it to survive even when you wipe/replace your hard disk and re-install your operating system. UEFI […]

Cyber Security

Cybersecurity in APAC: The art of simplicity and being on the right side of history

We all have “a-ha” moments when that lightbulb above our heads is just too bright to ignore. One came to me when I was in a previous IT operations role.  It happened on a day when I had two meetings: first with an endpoint agent team and another with a security operations team. The endpoint […]

Cyber Security

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts (source: https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/). For added perspective, a smart contract […]

Cyber Security

Cyber-Security Firm Reveals Most Wanted Malware

SAN FRANCISCO, CALIFORNIA — Cryptomining malware that dominated the top 10 most wanted malware in May has dug into nearly 40 percent of organizations globally, an increase of nearly 50 percent, a California-based cyber-security firm said Thursday. In its latest Global Threat Index for May 2018, Check Point Software Technologies Ltd., a global leading cyber-security […]

Cyber Security

Intel Processors now utilizing iGPU for Malware Scanning. Securing down to the hardware level

Last week during the RSA Conference 2018, Intel announced two new technologies—Threat Detection Technology (TDT) and Security Essentials. These are hardware-based built-in security features across Intel processors for threat detection without compromising system performance. Intel’s Threat Detection Technology (TDT) offers hardware-level telemetry helping security products detect new classes of threats and exploits. It’s two main […]

Cyber Security

Windows 7 PCs more vulnerable due to Microsoft’s own patch for Meltdown

If you haven’t heard of the Meltdown and Spectre vulnerabilities, these are security flaws discovered by researchers earlier this year found in computer processors from all manufacturers: Intel, ARM, and AMD, which means all current and previous generations of PCs, servers, and mobile phones are vulnerable to data theft. It became even worse on the […]