SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Stories by Mark Gorrie

Story image
Your travel guide to public Wi-Fi, security and privacy
Wed, 11th Sep 2024
#
data privacy
#
cloud services
#
privacy
Travelling often means relying on public Wi-Fi, but it comes with security risks. Learn how tools like VPNs can protect your financial data from hackers.
Story image
Beyond espionage – how the Lazarus Group is reshaping cybersecurity threats
Fri, 16th Aug 2024
#
cryptocurrency
#
blockchain
#
cybersecurity
Cybercriminal organisation transitions from espionage to exploitation, preying on individuals for financial gain.
Story image
What is vishing? Tips to spot and avoid voice phishing scams
Thu, 2nd May 2024
#
malware
#
uc
#
vpns
As vishing scams persist, we explore its mechanisms, common tactics, and how to deter these voice phishing attacks, safeguarding your personal data and finances.
Story image
Watch out! There are hidden dangers lurking in your PDFs
Mon, 15th Apr 2024
#
malware
#
advanced persistent threat protection
#
email security
PDFs' convenience inadvertently aiding cybercriminals: Avast researchers reveal PDF files increasingly exploited to distribute malware and carry out scams.
Story image
One wrong click can devastate your small business: so what can you do?
Wed, 10th Apr 2024
#
advanced persistent threat protection
#
risk & compliance
#
cybersecurity
Small businesses can fortify cybersecurity, bolster compliance, and support employee productivity with web domain and content filtering tools like Avast Business Web Control.
Story image
Why Whac-A-Mole is not a strategy for defending against ransomware attacks
Thu, 23rd Nov 2023
#
ransomware
#
cybersecurity
#
cloud services
SMBs should also consider strong personnel practices and awareness to implement a better defensive strategy than Whac-A-Mole.
Story image
Gen supports cyber safety for small businesses through the Avast business portfolio
Fri, 8th Sep 2023
#
firewalls
#
network security
#
breach prevention
The Gen portfolio of solutions for small businesses will help small businesses and scale to stay ahead of the latest cyber threats.
Story image
Is ChatGPT’s use of our personal data even legal?
Tue, 25th Jul 2023
#
uc
#
data protection
#
data privacy
As the field is always evolving, laws and regulations surrounding personal data use in AI are likely to evolve too.
Story image
Deepfake and AI 101: Twelve tips to spot a deepfake
Mon, 1st May 2023
#
physical security
#
email security
#
ai
Deepfake technology can be used maliciously or with unethical intent, and this means deepfakes are a potentially dangerous tool.
Story image
Norton’s 11 tips to help protect your privacy online
Wed, 15th Mar 2023
#
cybersecurity
#
cloud services
#
websites
Governments, businesses, and individuals can buy information about you that's been gathered online, like your health status, contact details and your location.
Story image
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022
#
malware
#
phishing
#
email security
There are so many social media platforms for us to choose from— and the same is true for cybercriminals looking to deploy their next attack.
Story image
The most common types of identity theft and top ten ways to avoid it
Tue, 6th Sep 2022
#
physical security
#
cybersecurity
#
cloud services
1 in 5 New Zealanders have experienced identity theft, with 5% impacted in the past year. Learn the most common types and how to prevent it.
Story image
Deep web vs dark web: NortonLifeLock explains the difference
Tue, 26th Jul 2022
#
cybersecurity
#
dark web
#
deep web
NortonLifeLock managing director for APAC Mark Gorrie explains what you need to know about the deep and dark web and the pros and cons of both.
Story image
Encryption: What it is, how it can help, and what to watch out for
Wed, 1st Jun 2022
#
malware
#
ransomware
#
data analytics
VPN Encryption: How it Protects Your Data and Keeps the Internet Secure. Learn about encryption and its role in internet security. #CyberSecurity.
Story image
The future of digital identity: the need for systems reform
Thu, 7th Apr 2022
#
physical security
#
cybersecurity
#
identity theft
Identity credentialing, proving you are who you say you are, needs to catch up to the technologies available. Currently, most organisations use simple means.
Story image
Website spoofing: What to know about counterfeit domain names to keep from getting scammed
Wed, 2nd Mar 2022
#
martech
#
cybersecurity
#
software development
Have you ever visited the website of a well-established brand but something about it didn't seem right? That may not have been the brand's website at all.