Asia's leading source of security and threat news
These search results are from across the Techday Network of sites
Fileless malware sneaks into Windows machines via USB flash drives
A malicious backdoor called BKDR-ANDROM.ETIN is using fileless malware to infect systems through USB flash drives.
Hackers are able to target your e-cigarette... Is nothing sacred?
"A lot of folks aren't aware that something like this is even possible."
Honeywell launches USB security solution for industrial control systems
"Plants need solutions that let people work efficiently, but also don’t compromise cyber security and, with it, industrial safety."
Hands-on review: MicFlip’s Reversible Micro USB Cable
MicFlip has created the first ever reversible Micro USB, compatible with all Micro USB plugs.
ESET discovers strange malware targeting USB
“It seems that this malware was created for targeted attacks on systems isolated from the internet.”
D-Link shows off spherical Wi-Fi USB adapter
"Our new USB Wi-Fi Adapter will significantly upgrade the network speeds of a device, providing the ability to do more online and stray farther."
Review: Mimobot Star Wars USB Drive
If you’re a Star Wars fan or not, it’s definitely worth a spot in your Mimobot collection.
Kiwi startup to solve USB charging woes
“We use our cables and devices so often that we have almost accepted this frustration as the norm.”
Review: Kaynex Sydnee
Here’s a first world problem. Most families have a pile of USB charged gadgets. Trouble is there are usually only a few suitable spots for plugging everything in to ensure they stay charged. As any parent with teens knows, Charged gadgets equals happy families.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?