Should organizations deploy application security tool (AppSec Tool) with known vulnerabilities just because of time pressures?
The answer is obvious, but apparently about half of the professional respondents in a recent study...
Read More
Select Page
By CybersecAsia editors and webmaster webmaster | Thursday, August 13, 2020, 11:55 AM Asia/Singapore | News, Newsletter
The answer is obvious, but apparently about half of the professional respondents in a recent study...
Read MoreBy Victor Ng | Thursday, August 13, 2020, 11:25 AM Asia/Singapore | Features, Newsletter
The academic research institution escaped cyber attacks when AI stepped in to prevent spread of...
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, August 12, 2020, 10:12 AM Asia/Singapore | News, Newsletter
These security flaws, Qualcomm Snapdragon Chips vulnerabilities can be exploited to threaten...
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, August 12, 2020, 9:50 AM Asia/Singapore | News, Newsletter
Hackers have used legitimate system-sanctioned tools to steal data, and security software simply...
Read MoreBy CybersecAsia editors and webmaster webmaster | Wednesday, August 12, 2020, 9:26 AM Asia/Singapore | News, Newsletter
Meanwhile, xHelper mobile malware continues its vicious activities, reinstalling itself even after...
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:46 AM Asia/Singapore | Newsletter, Tips
How can AI, policy-based automation and other strategies optimize data storage, management and...
Read MoreBy Rick McElroy, Principal Cybersecurity Strategist, VMware Security | Tuesday, August 11, 2020, 10:39 AM Asia/Singapore | Newsletter, Opinions
About 60% of CISOs rarely disconnect from work, and 17% either medicate or use alcohol...
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:29 AM Asia/Singapore | News, Newsletter
Deterring forgery and impersonation requires advanced printing and digital technologies that the...
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:20 AM Asia/Singapore | News, Newsletter
Even more dire consequences could surface if password reuse habits by compromised users are exploited by hackers.
A list containing plaintext usernames and passwords, along with IP addresses for over 900 VPN servers belonging to Pulse Secure VPN, has been published online as well as shared on a hacker forum used by cybercriminals.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, August 11, 2020, 10:03 AM Asia/Singapore | Newsletter, Tips
In rushed implementations of WFH access to the office network, risks were taken. Here are some...
Read More|
PARTICIPATE NOW |
|
|



