Asia's Source for Enterprise Network Knowledge

Friday, March 22nd, 2019

Security Email_and_Web_security

First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Mozilla plans to boost Firefox's defensive skills by mimicking the "Site Isolation"...
Concerns about pervasive email security threats have dampened adoption of cloud-based productivity...
Fraud
In business, security underpins everything - from customer experience to employee engagement,...
Businesses in Singapore lost more than S$43 million to business email impersonation scams in 2017...
Not knowing when, where or how phishing and ransomware attacks might succeed in tricking end-users...
Rapid digitalisation has resulted in a surge in both the number of endpoints and the means by which...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Google has switched on a defensive technology in Chrome that will make it much more difficult for...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
SQL injection, or SQLi, is one of the least sophisticated web application security attacks that can...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency....
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Consumers ranked security as more important than convenience in logging on to most kinds of app,...

WhitePapers

The public cloud has evolved from its nascent smattering of basic compute...
Digital technology today defines the competitive battleground, and...
In just the last year or two, the cyberthreat landscape has shifted...