Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
70% of security experts say social media should be government regulated
A survey has found the majority believe social media data collection needs to be regulated, despite having little faith in their governments.
Venafi announces business growth and expansion plans
Over the past year, Venafi has seen significant growth and success across every part of its business.
Blunder by Trustico revokes 23,000 website certificates
23,000 customers of Trustico recently received an email informing them their website security certificates will be rendered useless within 24 hours.
Assessing the rising threat of encrypted tunnels
Venafi senior technical manager Nick Hunter takes a look at five key threats posed by encrypted tunnel attacks.
INTERVIEW: What Google’s decision to distrust Symantec certificates means
Last year Chrome announced a formal plan to remove trust from Symantec-issued certificates - Venafi's Walter Goulet discusses the implications.
Malicious Reddit clone fooling users into giving away logins
A simple typo is taking users to a seemingly secure Reddit clone that is actually stealing their login details - we have commentary from two experts.
Four steps organisations can take to protect against encrypted tunnel attacks
Nefarious actors can use encrypted tunnels to pivot across corporate networks, eavesdrop, route traffic to phishing websites & access sensitive data.
Cyber warfare set to surge in 2018 but expert says Britain is not prepared
Cyber war has exploded and is now quite literally on our doorstep - despite this an expert claims Britain's defences are severely underfunded.
Cybersecurity experts opine on confession it’s not if but when UK is attacked
Ciaran Martin says the UK has been ‘fortunate’ to avoid an attack that could cause devastating disruption to elections or critical infrastructure.
Six questions every business needs to consider to measure their cyber security
For those of you reading this that don’t know your binary from a recursive hole in the ground, it’s important to have a little foundational knowledge.
Poor SSH key management an open invitation for malicious threats
Organisations that use Secure Shell (SSH) technologies and keys are doing a poor job of making sure they are secure, survey finds.
LinkedIn’s outage blunder left users exposed and was ‘easily preventable’
LinkedIn went down yesterday in countries across the world due to an SSL certificate expiry, leaving some users' data at risk with no encryption.
Illicit code signing certificates more valuable than handguns
Venafi has released its findings of a six month investigation into the lucrative sale of digital code signing certificates on the dark web.
Experts comment: Behind the Bluetooth 'BlueBorne' zero-days
As news spreads of the Bluetooth zero-day that affects more than 5 billion devices, security experts are warning users to use Bluetooth with caution.
State-sponsored election hacks are acts of cyber warfare - survey
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country’s election.
AU & NZ: An event worse than Y2K, are you protected?
"People don’t understand and are not ready for the repercussions of what is going to happen on January 1st 2017.”