Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Security survey: The internet’s for porn… and gaming
"As well as being inappropriate use of a work device, these sites are more likely to harbour malware or other malicious threats that lead to a compromise."
OPPO partners with bug bounty company HackerOne
With over 320 million monthly active users of OPPO’s ColorOS, and a rapidly expanding online presence, cybersecurity is top of mind for the mobile phone manufacturer.
Sophos launches Intercept X for mobile
New security for Chrome OS and mobile threat defence for Android and iOS devices protects users from new fleeceware applications uncovered by SophosLabs.
How SMS became the trusted mode of customer communications
About 90 percent of text messages are read within three minutes of receipt and we’re seven times more likely to respond to a text than an email.
Apple issues clarification on extent of iOS malware infection
The attack affected fewer than a dozen websites that focus on content related to the Uighur community.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."
CrowdStrike: Best practices for mobile device security
The workforce is more reliant than ever on business-critical applications, which can access confidential information from multiple devices at any time and anywhere.
Tenable leverages partner ecosystem with new integrations
Tenable has introduced 19 new technology integrations to its Cyber Exposure Ecosystem on an open platform in a bid to better protect against security risks.
CrowdStrike announces endpoint detection for mobile devices
The workforce is more reliant than ever on business-critical applications, accessing confidential information from multiple devices anytime, anywhere.
Sophos Mobile Security now integrates Microsoft Intune
In the case of a threat or compromise, intelligence insights can help administrators decide when to lock down an individual endpoint and deny access corporate data.
GlobalSign, Microsoft join forces to strengthen mobile security
This provides greater assurances that the identity in the certificate matches the identity associated with the Intune policy set forth for the device/user.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Achieving uncompromising security without compromising privacy
This is an age where it is critical to achieve comprehensive cybersecurity without invading users’ privacy, hindering their mobility, or impeding their efficiency.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
The three principles of effective data management
"Data has become big business, creating massive revenue streams for those who can understand it."
GDPR and backup – balancing business continuity and data protection
It’s over six months since the implementation of the General Data Protection Regulation (GDPR) and we’re now at the in-between phase. T
SMS phishing scam sweeps Australia
"SMS is an easier way for scammers to pretend they are sending from a well-known business that people know and trust."
Microsoft comments on recent tech support scam crackdowns
Despite the crackdowns, Microsoft warns that these scams persist and target everyone, no matter their age or location.
How to combat human error in cyber risks
It’s an old adage in security that people are the weakest link – mostly because of human error.
Uber disguised breach ransom payment as a bug bounty reward
“Paying the attackers and then keeping quiet about it afterwards was not, in our view, an appropriate response to the cyber attack."
HID Global brings high authentication to mobile
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.