SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

We Live Security stories - Page 2

Story image
Working in the cyber security industry
Wed, 16th Nov 2016
#
malware
#
cybersecurity
#
cyber criminal
Diving into cyber security careers, industry experts reveal the skills needed to fight cybercrime and the dynamic nature of this ever-evolving field.
Story image
10 gadgets every white hat hacker needs in their toolkit
Tue, 1st Nov 2016
#
cybersecurity
#
hacking
#
we live security
Essential hacker hardware: Top 10 must-have gadgets for ethical hacking pros unveiled.
Story image
Online safety tips for social media and IM fans
Mon, 17th Oct 2016
#
malware
#
cybersecurity
#
cios
Stay safe online! As Cyber Security Month kicks off, learn key tips to protect your social media and messaging accounts.
Story image
Do you know how to steer away from online banking trouble?
Thu, 13th Oct 2016
#
digital banking
#
online banking
#
cios
Checking your account balance, paying bills and managing your finances...nowadays, it is pretty normal to do all these things online.
Story image
How to handle multiple devices and passwords at once
Tue, 11th Oct 2016
#
cybersecurity
#
passwords
#
we live security
It seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets & security concerns.
Story image
How do you work out a country’s level of cybersecurity?
Tue, 4th Oct 2016
#
cybersecurity
#
we live security
Initially developed in 2013, the GCI is engaged in a perpetual update process to determine the relevant aspects of the security of ITU member states.
Story image
Snowden: 4 big security and privacy assumptions he undermined
Tue, 20th Sep 2016
#
malware
#
cybersecurity
#
cios
I want to discuss four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
Story image
Business security: Securing your data weak points
Tue, 13th Sep 2016
#
cybersecurity
#
retail
#
we live security
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
Story image
How to give your social media security an important boost
Wed, 7th Sep 2016
#
cybersecurity
#
social media
#
cios
Social media has become an important part of modern life - one that can cause serious headaches if you’re sharing with a wider audience than intended.
Story image
Ransomware: To pay or not to pay, that is the question
Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it’s the cheaper option.
Story image
Nemucod is back and serving an ad-clicking backdoor instead of ransomware
Mon, 15th Aug 2016
#
malware
#
cybersecurity
#
cios
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Story image
Firefighting, security and compliance - are they separate issues?
Thu, 4th Aug 2016
#
cloud services
#
cybersecurity
#
firefighting
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Story image
Ransomware: First files … now complete devices
Mon, 11th Jul 2016
#
malware
#
ransomware
#
cybersecurity
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Story image
Types of VPN networks and how they work: Do you know which kind to use?
Mon, 11th Jul 2016
#
malware
#
vpn
#
cloud services
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information.
Story image
Malicious scripts in compromised websites - and how to protect yourself
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
cios
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
Story image
10 tips for staying cyber-safe when on the road
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
retail
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.
Story image
The 5 most common reasons for corporate data loss
Mon, 27th Jun 2016
#
dlp
#
cios
#
retail
There is no doubt that one of the main assets of a company is the data it stores. It should be adequately protected & available when needed.
Story image
Quantum Computation: A cryptography armageddon?
Mon, 20th Jun 2016
#
malware
#
quantum computing
#
cybersecurity
Cryptography is at risk of being broken by quantum computers, but post-quantum cryptography offers solutions. #PQCrypto #QuantumComputing.
Story image
Most organisations unconfident in ability to protect data after breach
Tue, 14th Jun 2016
#
breach prevention
#
cybersecurity
#
we live security
The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach.
Story image
Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals
Tue, 17th May 2016
#
cybersecurity
#
cios
#
flash player
As I write this, if you’re running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you’re potentially at risk.