Anti-virus vendors CrowdStrike and Invincea announce they will integrate their malware-detection technologies into Google's VirusTotal, but other vendors in the space are still holding out.
Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
Thai police say they have identified all of the suspects allegedly involved in recent "jackpotting" malware attacks against 21 ATMs, leading to the theft of 12 million baht ($350,000). The malware is a new strain called "Ripper," raising concerns for banks worldwide.
A report on an FBI warning to state election officials that their IT systems could be hacked leads the latest edition of the ISMG Security Report. Also, Australian officials mull bitcoin technology to secure elections.
Russian citizen Roman Valerevich Seleznev, 32, has been convicted of stealing data from more than 2 million U.S. payment cards and defrauding 3,700 financial institutions of at least $169 million.
To keep up with emerging threats, banks and other organizations in Saudi Arabia and throughout the region must develop much more mature incident response functions, says Mohammed Almozaiyn, who heads incident response for a leading Saudi bank.
Why is the Asia-Pacific region lagging far behind Europe and the United States in detecting data breaches? Rob van der Ende, vice president at FireEye's Mandiant, analyzes the results of the firm's new M-Trends Report 2016 for the Asia-Pacific Region and pinpoints breach detection shortcomings.
Many Asia-Pacific organizations are woefully unprepared to detect and respond to data breaches, according to Mandiant's M-Trends Report 2016. In fact, the report finds that the median amount of time it takes to discover an attack in the region is 520 days.
A UAE-based activist targeted by a rare and valuable remote exploit for Apple's mobile software has caused concern over the continued sale of powerful spying tools to governments with poor human rights records.
Cisco has begun releasing updates for all ASA devices to patch them against a buffer overflow vulnerability that was targeted by leaked Equation Group attack tools. Attackers can exploit the flaw to gain remote control of ASA devices.
The process of managing software vulnerabilities inside the enterprise is complicated by the sheer number of patches that must be assessed, applied, tested and rolled out, says Wolfgang Kandek of Qualys, who offers suggestions on how to better focus those efforts.
Australia's postal service is researching the use of the public cryptographic ledger known as blockchain for e-voting applications, but experts cast doubt on whether the approach would help resolve the many worries around internet voting.
If leading intelligence agencies can seemingly hack a wide variety of IT gear, what hope is there for enterprise security? Experts describe how organizations should respond to the recent dump of attack tools from the Equation Group, which is widely believed to be tied to the NSA.
Ransomware gangs increasingly target organizations - including hospitals and banks - that might be able to recover from such attacks, but not in a timely manner, says Verizon's Mark Rasch. Learn how well-honed incident response plans can help.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.