Cyber Security

Cybersecurity in APAC: The art of simplicity and being on the right side of history

We all have “a-ha” moments when that lightbulb above our heads is just too bright to ignore. One came to me when I was in a previous IT operations role.  It happened on a day when I had two meetings: first with an endpoint agent team and another with a security operations team. The endpoint […]

Cyber Security

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts (source: https://www.bleepingcomputer.com/news/cryptocurrency/researchers-find-34-200-vulnerable-ethereum-smart-contracts/). For added perspective, a smart contract […]

Cyber Security

Cyber-Security Firm Reveals Most Wanted Malware

SAN FRANCISCO, CALIFORNIA — Cryptomining malware that dominated the top 10 most wanted malware in May has dug into nearly 40 percent of organizations globally, an increase of nearly 50 percent, a California-based cyber-security firm said Thursday. In its latest Global Threat Index for May 2018, Check Point Software Technologies Ltd., a global leading cyber-security […]

Cyber Security

Intel Processors now utilizing iGPU for Malware Scanning. Securing down to the hardware level

Last week during the RSA Conference 2018, Intel announced two new technologies—Threat Detection Technology (TDT) and Security Essentials. These are hardware-based built-in security features across Intel processors for threat detection without compromising system performance. Intel’s Threat Detection Technology (TDT) offers hardware-level telemetry helping security products detect new classes of threats and exploits. It’s two main […]

Cyber Security

Windows 7 PCs more vulnerable due to Microsoft’s own patch for Meltdown

If you haven’t heard of the Meltdown and Spectre vulnerabilities, these are security flaws discovered by researchers earlier this year found in computer processors from all manufacturers: Intel, ARM, and AMD, which means all current and previous generations of PCs, servers, and mobile phones are vulnerable to data theft. It became even worse on the […]

Cyber Security

μTorrent software flaw allows hackers to control your PC remotely

If you are a μTorrent user on the Microsoft Windows Platform, it is advised that you download it’s latest version as soon as possible. A security researcher from Google’s Project Zero discovered a form of remote code execution vulnerability in both desktop and web browser app of the μTorrent client. Project Zero researcher Tavis Ormandy found that […]