Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Reinventing next-generation firewalls for coordinated protection
The escalation in volume and complexity of cyber threats today have compelled organisations to turn to next-generation security solutions.
Insider threats escalate and thrive in the Dark Web
Disgruntled employees are gladly selling their services to the bad guys in order to inflict harm on their employers.
Check Point research: 2300 active global malware families - and they're growing fast
The amount of global malware families just keeps going, with an increase of 15% in May 2016, totalling 2300 unique and active malware families.
Scammers claim there is a virus in Apple’s iTunes database
Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information. Here's the rundown.
New Sofacy attacks against US government agency
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Fight against spam now a global effort
Enforcement agencies from around the world including New Zealand have signed a Memorandum of Understanding to fight against spam.
McAfee report: Mobile collusion app attacks on the rise, W32/Pinkslipbot Trojan back
McAfee Labs Threats Report: June 2016 shows that mobile app collusion and the W32/Pinkslipbot Trojan are the biggest cyber threats lurking.
From a drip to a flood - the impact of a data leak
Data leaks, especially from an organization’s point of view, are a huge and growing problem, as the fallout can be devastating.
Facebook Messenger hack exposed: Expert insights and advice
A recently discovered vulnerability in Facebook Messenger could have had monumental consequences - here is some advice for protecting yourself.
Protecting email is essential to your security strategy
Fortinet’s Gary Gardiner explains why email security is perhaps the most cost-effective network protection you can deploy.
How to shift the economic balance of cyber attacks
A harsh reality for the information security sector is that the businesses we are asked to protect are battling businesses that are built to attack.
What's an ELOFANT and how can you stop them threatening your data?
If you’re concerned about the security of your organization’s data, you should be looking out for ELOFANTs on your network.
Akamai discovers new DDoS threats, issues medium risk level
A potentially malicious DDoS vulnerability has been discovered by Akamai's Security Intelligence Response team.
Danti: Destroying your data through one unpatched exploit
Danti is one of the newest and most dangerous groups of hackers taking advantage of a dangerous exploit that can gain access to IT systems and infect
Banks 'could do more' as another email scam targets Kiwis
Hackers are getting access to email accounts and altering bank account numbers on invoices before they reach the client, according to Consumer NZ.
Why not extend our existing NZ security fabric nationally?
While there were many positive responses to the NZ government's announcement to invest in cyber security, McGettigan believes it already exists.
ESET releases free decryptor for recent variants of TeslaCrypt ransomware
As cybercriminals find new backdoors into our personal digital spaces, it’s important that we continue to adapt and evolve.
HPE study delves into the underworld workings of cybercriminal economy
New Business of Hacking report looks at adversary value chain as driving force in cybercrime and provides actionable insights.
John Key's $22m cyber security announcement: Industry insider opinion
Key recently announced a $22 million fund to go towards setting up a national security agency - here is an industry insider opinion.
UK: Two Thirds of big business has been breached this year
The UK Government has sponsored a survey that reveals a significant fraction of businesses have been breached this year.
The key to deterring cyber crims? Make an attack not worth their time
"Increasing the cost of an attack by forcing hackers to create new methods when they attempt to breach a system, will reduce the number of attacks."
ALE OmniSwitches gain extra layer of security to battle modern cyber attacks
Today's malicious cyber environment has seen the recent technology partnership between Alcatel-Lucent Enterprise (ALE) and LGS Innovations.
Is Big Brother watching? How metadata can affect you
It's been 5 months since the introduction of Australia's metadata laws came into effect, and the general public's understanding remains vague at best.
Cyber threats evolving at a rapid pace
"The rapid evolution of the cyber threat environment has consequences that are much broader than just technical, operational, and financial."