Asia's leading source of security and threat news
Login
Register
Search
All stories:
Page 4
These search results are from across the Techday network of sites
15 Mar
Popular iPhone call recording app left recordings unsecured on the web
A researcher discovered the vulnerability in a free app called Automatic call recorder, offered for free on the App Store for iPhone.
More
15 Mar
Yubico pledges to secure world's most at-risk organisations
Yubico is partnering with Microsoft to offer 25,000 free YubiKey security keys to high profile and high risk organisations across 31 countries.
More
12 Mar
Virtual economy shifts paradigm of trust in the digital age - Okta
2020 was the year in which almost everything went online. Work, social meetups...
More
12 Mar
How to achieve ransomware resilience in three steps
All organisations need advanced threat protection to stop ransomware attacks and ease the impact if they do occur, writes Bitglass CTO Anurag Kahol.
More
12 Mar
Anomali picks up pace on APJ expansion with exec appointment
Cybersecurity firm Anomali has appointed channel sales specialist Stree Naidu to lead its business across APJ.
More
11 Mar
IT leaders rehash remote work tools for long-term prosperity - LogMeIn study
The security and scalability of software and tools used to support remote working is being called into question by many IT leaders
More
11 Mar
Surge in vaccine-related phishing attacks as rollout picks up momentum
Spikes in vaccine-related phishing activity centred around new updates, announcements and ground-breaking approvals from around the world.
More
11 Mar
Staff sharing sensitive company data through IM & collaboration tools - Veritas
Client information, HR issues and business contracts, plans, and COVID test results are commonly exposed.
More
11 Mar
Organisations must pay off their post-pandemic cyber debt
Budget cuts, redundancies, delays to cyber resilience projects and increased remote working in the last 12 months could all have increased organisations' risk of a cyber attack in 2021.
More
10 Mar
Security alert: Widespread exploitation on Microsoft Exchange
According to an advisory from CERT NZ, widespread exploitation activity has already occurred as a result of the vulnerabilities within the Microsoft Exchange.
More
10 Mar
Jamf acquires tools from cmdSecurity to secure macOS enterprise offerings
cmdReporter co-founders Daniel Griggs and Metzger have now joined the Jamf team.
More
10 Mar
Cryptography orchestration reimagined for the enterprise
Unbound has announced its new CORE platform, a next-generation solution offering that delivers comprehensive cryptography orchestration for enterprises.
More
09 Mar
MITRE ATT&CK: A holistic cyber approach
"For a CTI program to be effective, an organisation needs to have a good idea of the threats they are facing, combined with the assessment of the likelihood and impact such an incident would have."
More
08 Mar
IWD 2021: Talend CISO on empowering women in the workplace
"It’s time to break down barriers to equality. We need to feature technical women in a way that resonates with young female audiences."
More
08 Mar
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.
More
08 Mar
Akamai named leader for DDoS mitigation solutions in The Forrester Wave
“As opposed to other 'all in one' solutions that can be vulnerable to platform outages, our distinct, purpose-built DDoS solutions are architected to ensure multiple levels of resilience."
More
08 Mar
IWD 2021: LogRhythm VP on recognising the skills women bring to the table
"There is an opportunity for IT companies to strengthen their learning and development pipeline and help women acquire the relevant skills."
More
08 Mar
Cloud-based email threats capitalising on chaos of COVID-19
Trend Micro blocked 16.7 million high-risk email threats that slipped past webmail providers' native filters, an increase of nearly a third on 2019 figures.
More
05 Mar
Connected car technology vulnerable to cyber attacks - Trend Mirco
there are ample opportunities for attackers looking to abuse connected car technology."
More
05 Mar
Microsoft to launch data center region in Indonesia
The region aims to bring Azure services and upskill an additional three million Indonesians.
More
05 Mar
Okta's $6.5b Auth0 acquisition carves deeper path into identity market
Auth0 will become an independent business unit within the security giant, Okta.
More
04 Mar
Microsoft adds new ways to bring AI to the edge with Azure Percept
"The goal of the Azure Percept platform is to simplify the process of developing, training and deploying edge AI solutions."
More
04 Mar
“Cybersecurity risk has never been greater," declares FortiGuard Labs
Adversaries are highly adaptable as they conduct sophisticated attacks, particularly against remote workers, digital supply chains, and core networks.
More
03 Mar
Cybercriminals take bold steps forward as confidence soars - CrowdStrike report
Criminals are especially interested in targeting the supply chain as it enables them to go after multiple targets from a single intrusion point.
More
02 Mar
Stalkerware remains significant problem throughout COVID lockdowns
Stalkerware remains a significant problem with more 50,0000 users affected globally in 2020.
More
02 Mar
Countering the evolving threat of ransomware
Cyber-criminals will continue to change their methods to maximise the chance of success, writes Zscaler regional vice president and A/NZ country manager Steve Singer.
More
01 Mar
Sophos announces collaboration with Qualcomm for PC security
This unification enables a connected, interactive computing environment that combines smartphone and PC technology to deliver security capabilities and opportunities, the company states.
More
01 Mar
Kaspersky ranked number one in channel partner satisfaction
“Being recognised for the second consecutive year as the number one cybersecurity vendor for channel satisfaction, reflects the investment we have made in the Kaspersky United partner program over the past two years."
More
01 Mar
Y Soft adds to identity verification solution portfolio
Y Soft is adding to its portfolio of identity verification solutions with the release of a new secure identity verification for networked printers.
More
26 Feb
Covid-19 sees rapid cloud adoption, rise in double-extortion ransomware
“We need to act now to stop this cyber pandemic spreading out of control."
More
« First
‹ Prev
1
2
3
4
5
6
7
8
…
Next ›
Last »