Asia's Source for Enterprise Network Knowledge

Monday, April 22nd, 2019

hacking

Teenager becomes world's first US$1M bug bounty hacker on HackerOne

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

HackerOne, the a hacker-powered security platform, announced that bug bounty hacker @try_to_hack is the first to surpass US$1 million in bounty awards for helping companies become more secure. 

Retailers most common credential stuffing attack victim

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Hackers directed credential abuse attempts at retail sites more than 10 billion times from May to December last year.

Nine out of 10 Singapore orgs are exposed to email scams through spoofing

Nine out of 10 Singapore orgs are exposed to email scams through spoofing

According to a local security start-up, nine out of 10 organisations in Singapore are vulnerable to email spoofing and scams.

Study reveals a massive 92% rise of 0-day malware on mobile devices

ZTE introduces LoRa-based smart meters

In the last 6 months, Pradeo Lab observed a massive 92% rise of 0-day malware on mobile devices, demonstrating that hackers are strongly focusing their attention on enterprise mobility and constantly innovating to overcome security fences.

Do you need a vulnerability disclosure program? The feds say yes

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

 

Security 101: Protecting Wi-Fi networks against hacking and eavesdropping

Security 101: Protecting Wi-Fi networks against hacking and eavesdropping

Setting up small business networks is relatively simple and rudimentary if you don’t set up devices heedlessly and put data at risk over unsecure networks.

Is 'white-hat' hacking the best form of defense?

Centurion Information Security

Today it is more critical than ever for organisations to actively ferret out cyber loopholes. This has led to a demand in ethical “white-hat” hackers, who carry out penetration tests to expose hidden weaknesses, like criminal (or black-hat) hackers.

Plenty of easy marks for hackers, warns security report

Plenty of easy marks for hackers, warns security report

Botnets continue to impact millions of computers globally, infecting them with old and new forms of malware, according to the 23rd volume of Microsoft’s Security Intelligence Report (SIR).

Cyber criminals are exploiting traditional measures of trust on the web: report

Cyber criminals are exploiting traditional measures of trust on the web: report

Many of the supposedly safest neighborhoods of the web are in fact risky places to visit.

New Russian-speaking hackers target financial companies

New Russian-speaking hackers target financial companies

The hits are being performed by a new group called Silence. While stealing funds from its victims, Silence implements specific techniques similar to the infamous threat actor, Carbanak.