Asia's Source for Enterprise Network Knowledge

Sunday, April 30th, 2017

Cybersecurity And Cybercrime

Application security
When an organization develops an application that connects their servers to the public Internet,...
Earlier this month, I was invited to moderate a panel discussion in Jakarta on the Indonesian...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Users that run unpatched software beware. Hackers have been relying on an old software bug tied to...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ,...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Dallas city officials have added extra encryption and other security measures to the outdoor...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
The most effective cyberattacks turn the tables on the security measures we take to ward off...
Ask CIOs and CISOs what cybersecurity fears keep them up at night and you’ll hear a range of...
Preparing and responding to a cyberattack Cybersecurity incidents continue to grow in both volume...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
One bug in Slack, the popular work chat application, was enough for a security researcher to design...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
More than 130 Android apps on the Google Play store have been found to contain malicious coding,...

WhitePapers

Ransomware has become a serious epidemic affecting businesses of all sizes, and...
Synopsys commissioned Forrester Consulting to conduct a Total Economic Impact (...
Security tools can’t inspect what they can’t see. To defend against...