Windows 10 users to enjoy a one-year reprieve from forced upgrade
Corporate- and end-users can use the extension period to prepare for the forced upgrade to Windows 11 or adopt alternative OSes.
Read MoreSelect Page
By CybersecAsia editors | Friday, June 27, 2025, 2:38 PM Asia/Singapore | News, Newsletter
Corporate- and end-users can use the extension period to prepare for the forced upgrade to Windows 11 or adopt alternative OSes.
Read MoreHere are five detailed measures that IT admins/home users can take to control what personal data is being leaked
Read MoreBy L L Seow | Tuesday, March 18, 2025, 2:40 PM Asia/Singapore | News, Newsletter
Obedient users who rush to apply OS patches promptly sometimes end up paying a heavy price for...
Read MoreBy CybersecAsia editors | Tuesday, March 11, 2025, 10:08 AM Asia/Singapore | News, Newsletter
Hosting malware on a reputable developers’ platform possibly lowered the public’s guard and helped to compromise 1m devices within two months
Read MoreBy CybersecAsia editors | Tuesday, October 1, 2024, 10:20 AM Asia/Singapore | News, Newsletter
Apparently, the infiltrations had occurred a long while back. Remember the saying, “Fool me twice, shame on me?”
Read MoreBy CybersecAsia editors | Tuesday, June 11, 2024, 10:17 AM Asia/Singapore | News, Newsletter
With great OS power come great memory lapses, data leaks and ignored CEO directives, it seems.
Read MoreBy CybersecAsia editors | Tuesday, May 14, 2024, 4:45 PM Asia/Singapore | News, Newsletter
Here is a ranking based on one cybersecurity firm’s own data and research.
Read MoreBy Soham Sengupta | Thursday, November 16, 2023, 3:06 PM Asia/Singapore | Cyberthreat Landscape, News, Newsletter
In the evolving landscape of cybercrime, staying protected means uniting across borders for holistic and collective defense.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, September 19, 2023, 9:38 AM Asia/Singapore | News, Newsletter
Vulnerabilities across an entire system can be chained together during exploitation, to increase the blast area.
Read MoreBy CybersecAsia editors | Wednesday, August 16, 2023, 9:25 AM Asia/Singapore | Most Read2, News, Newsletter
Attackers can intercept connector credentials via MITM attacks, or hack the Password Hash Sync process, thereby extracting domain users’ NT hashes
Read More
PARTICIPATE NOW |
|