More staff returning to office? Time to retake lost cybersecurity opportunities with these tips
After a year of home usage, office laptops need to be quarantined and sanitized, according to a cybersecurity scientist.
Read MoreSelect Page
By CybersecAsia editors and webmaster webmaster | Tuesday, April 13, 2021, 12:29 PM Asia/Singapore | Newsletter, Tips
After a year of home usage, office laptops need to be quarantined and sanitized, according to a cybersecurity scientist.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, February 16, 2021, 11:30 AM Asia/Singapore | Newsletter, Tips
What you should do when unsolicited bug bounty hunters demand payment for identifying your system vulnerabilities…
Read MoreBy Sumit Bansal, Managing Director, ASEAN, Sophos and webmaster webmaster | Tuesday, February 16, 2021, 11:07 AM Asia/Singapore | Opinions
From using a network’s own legitimate system tools against itself to buying Ransomware-as-a-Service, hackers are getting bolder by the day.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, February 9, 2021, 9:44 AM Asia/Singapore | Newsletter, Tips
Here are some quick general reminders on staying safe today and every day—for you and everyone sharing the same cyberspace.
Read MoreBy CybersecAsia editors and webmaster webmaster | Friday, February 5, 2021, 12:28 PM Asia/Singapore | News, Newsletter
A long-running remote-access tool has been rejuvenated with up-to-date evasion and obfuscation tactics to sneak through modern gatekeepers.
Read MoreBy Ayshwaria Lakshmi, IMAWS and webmaster webmaster | Monday, February 1, 2021, 12:19 PM Asia/Singapore | Features, Newsletter
Indifference, insufficient resources and inept governance are making Pakistanis sitting ducks for cybercriminals to prey on.
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, January 25, 2021, 3:29 PM Asia/Singapore | News, Newsletter
SQL servers are especially attractive as they pack more processing capabilities to support cryptomining, with MrbMiner as a good example.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, December 29, 2020, 7:22 AM Asia/Singapore | Newsletter, Tips
Understanding how business email compromises work to push fraudulent gift cards can vaccinate us from increasingly-sophisticated variants that will inevitably surface.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, December 17, 2020, 11:52 AM Asia/Singapore | Features, Newsletter
The evolution of cybercrime consists of 29 arbitrary round milestones and three arbitrary eras dividing them, starting from the year 2000.
Read MoreBy Sumit Bansal, Managing Director, ASEAN, Sophos and webmaster webmaster | Wednesday, November 11, 2020, 9:00 AM Asia/Singapore | Newsletter, Opinions, Sponsored
The human element continues to be one of the weakest links when it comes to data breaches.
Read MoreBy CybersecAsia editors and webmaster webmaster | Monday, November 9, 2020, 3:54 PM Asia/Singapore | News, Newsletter
Based on the embedded political messages and past uses of a China-linked backdoor malware, threat hunters suspect China state-sponsored hackers.
Read MoreBy CybersecAsia editors and webmaster webmaster | Thursday, October 22, 2020, 3:50 PM Asia/Singapore | News, Newsletter
One study may be the first to even touch on the psycho-social impact of ransomware attacks on cyber defenders.
Read MoreBy L L Seow | Wednesday, October 21, 2020, 11:49 AM Asia/Singapore | Features, Most Read1, Newsletter
Cybersecurity features have lagged way behind the allure of smart-home automation devices: time for manufacturers and end-users to wise up!
Read MoreBy Victor Ng | Friday, October 16, 2020, 11:51 AM Asia/Singapore | Cyberthreat Landscape, Features, Newsletter
After 9.9. and 10.10, businesses and shoppers are gearing up for 11.11, Black Friday, Cyber Monday and 12.12. And so are cybercriminals…
Read MoreBy Tad Heppner, Threat Researcher, SophosLabs and webmaster webmaster | Wednesday, September 2, 2020, 9:50 AM Asia/Singapore | Newsletter, Opinions
Know the various ways cybercriminals evade detection by using only a network’s own sanctioned tools for the attack.
The best way to test if a door is locked is to try to open it. Similarly, one of the best ways to test your computer security is to try to breach its defenses using known tools. These are referred to as ‘grey hat’ tools and they are used legitimately by penetration testers and red teams to launch attacks with benign payloads on computers and networks.
Read More
PARTICIPATE NOW |
|