What’s Your Perimeter? Network, Identity, or Endpoint?
The answer depends on which era did you ask this question. From the 90s to the noughties the answer was “Network” since every critical...
Surge in Remote Work Increases Cybersecurity Risks adding to COVID-19 Pandemic
With Coronavirus or COVID-19 pandemic, organizations across the world are restricting their employees to work from home as part of social distancing to decrease...
Singapore to Introduce Cybersecurity Labelling Scheme
As part of the Safer Cyberspace Masterplan, the Cyber Security Agency (CSA) of Singapore is set to launch the Cybersecurity Labelling Scheme (CLS). For...
Securing Email Data When the Office Computer Comes Home
The office laptop is finding its way into living rooms and bedrooms, as more organizations allow their employees to work from home. Traveling staff...
NULLCON to Launch 11th Edition of Cybersecurity Conference in Goa, India
All roads lead to Goa, India’s tourist destination, next week, for the NULLCON 2020 Conference. NULLCON, Asia’s leading information security conference, training and exhibition...
10 IoT Security Incidents That Make You Feel Less Secure
Internet of Things (IoT) has become a primary target for cybercriminals. The repeated security incidents on IoT devices represent a rising trend for IoT...
Hackers Exploit Android Vulnerability Via Malicious Apps
Researchers from cybersecurity firm Trend Micro revealed that they’ve discovered three malicious apps on Google Play, which are designed to compromise victim’s devices and...
Amazon’s Ring Slammed with Federal Lawsuit
Ring, a home security product provider owned by e-commerce platform Amazon, has been hit by a class-action lawsuit in the U.S. for reports of...
Wyze Data Breach May Have Exposed 2.4 M Users’ Information
Internet of Things Vendor Wyze confirmed that it suffered a data breach earlier this month that may have exposed details of 2.4 million users...
Vulnerability Found in TP-Link’s Archer Routers, Now Fixed
TP-Link’s Archer Router series which is capable of handling high-speed online traffic had a vulnerability that if exploited, could allow hackers to bypass the...