Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice
In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Alphabay disappears: Three scenarios to look for next
Exit scams are one of the risks when conducting business in criminal marketplaces.
DRS CEO: “There are 3 groups of hackers: black, grey and white.”
Most of us get a mental image of an anonymous, hooded figure, bent over a computer in some dark recess of the web when the word hacker is mentioned.
The malware that brought down Ukraine – is it really that sophisticated?
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Hackers are able to target your e-cigarette... Is nothing sacred?
"A lot of folks aren't aware that something like this is even possible."
Hackers run circles around Samsung's iris scanner security
It wasn’t exactly the kind of hacking you see in the Fast and the Furious franchise.
Pirates of the Caribbean film held ransom by, well.. pirates
The hackers have demanded an enormous undisclosed amount of money be paid in Bitcoin. Disney apparently refuses to pay, and is working with the FBI.
Spoiler alert: Hackers leak unreleased Netflix series
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.
When innocent mistakes turn into costly problems
While S&R professionals often think “outside-in” first when assessing threats, awareness of internal threats can also be a key requirement.
Synack to bring hacker-powered intelligence platform to APAC
Singtel Innov8 and HPE are some of the big investor names behind the first hacker-powered intelligence platform to the world.
Trend Micro's three tips to catch a hacker
If you know what you’re looking for you might be able to spot a potential hacker and an impending cyber attack.
Weekly Asia security roundup: China’s cybersecurity law, hackers speak out, the MINDEF breach, and Yahoo’s CEO
SecurityBrief Asia revisits the biggest stories from the week that was.
Hackers speak out: New study turns security stats on their head
The study confirms suspicions that attack methods are becoming ever more unique, with 50% of hackers changing their attack methods for every target.
Cyber attacks are borderless and China isn’t immune, 360 Security says
360 Enterprise Security Group has commented on China’s inability to keep foreign cyber attacks out of its walls, and cyber crime is now ‘borderless'.
Why China’s new cybersecurity law is a threat to international businesses and innovation
Under the veil of cybersecurity, regulators will have access to information that could benefit Chinese firms at the expense of foreign business.
Russian hackers steal Olympic athletes data: Insights and advice from Webroot
Unless you’ve been living under a rock, you’d be aware of the recent hacking of the World Anti-Doping Agency (WADA) - here's Webroot's insights.
APAC takes 520 days too long to respond to threats, says FireEye
New research has found that it is taking APAC much longer than the rest of the world to detect cyber threats: a median 520 days.
Kaspersky Labs offers $50,000 'bug bounty' to security researchers
Security researchers Kaspersky Lab & bug bounty platform Hacker One are co-launching a Bug Bounty Program that offers $50,000 to security researchers.
Norton tackles hackers using Wi-Fi
“What turns people into easy targets is confusion about the security of public Wi-Fi networks."
Mark Zuckerberg masks his webcam - should you?
Both the webcam and dual microphone on his laptop are covered by tape, this shows the tech-savvy Facebook boss is worried about being spied on.
Danti: Destroying your data through one unpatched exploit
Danti is one of the newest and most dangerous groups of hackers taking advantage of a dangerous exploit that can gain access to IT systems and infect
SMEs need to up their security game or risk becoming a target
“It will be interesting to look at these numbers in a year’s time and see whether the SMEs are stepping up their security spend, and why."
The surprisingly scary patterns revealed in hack attacks
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.