<
>

Posts in Cyber Crime & Forensic

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears similar...

DON’T LET STOLEN PASSWORDS MAKE YOU EASY PREY FOR CYBER CRIMINALS

By Morey Haber, CTO & CISO at BeyondTrust   If you were a cyber criminal, imagine what you could do with a cache of stolen passwords. Perhaps you might launch a brute force attack against...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or defraud...

Escalating Cyber Risks and Failure to Prioritise Cybersecurity Hampering Digital Transformation Efforts in APAC

During a partners and media conference held in Kuala Lumpur this week, Forcepoint unveiled the findings of an Asia Pacific (APAC) study conducted by IT analyst firm Frost & Sullivan, revealing...

Dell Latitude 10th generation brings speed and security to a new level

As digitalisation continues to innovate workplace mobility, mobile PCs for businesses need to be able to cope with the growing demands of this as well. Today, mobility allows employees to work from...

Closing the Gap in Cybersecurity Spending

Cybersecurity threats continue to be a significant concern for most businesses in various industries. There have been many approaches by cybersecurity providers to find out the problem organisations...

Malwarebytes Webinar: You Got Breached. Now What? Are You Secure in Your Security Strategy?

Two painful truths about modern cyber threats. One is that no one can guarantee they can prevent 100% of all attacks from being successful. Second is that when malware gets through, it often stays...

C-Level Cyber Security Round Table Supported by Ingram Micro, Fortinet & IBM

Cybersecurityasean.com (CSA) teamed up with CyberSecurity Malaysia and Ingram Micro to run an executive round table at the Mandarin Oriental on 26th March 2019.   The roundtable...

BIOMETRIC DATA: RIPE FOR ABUSE AND MISUSE?

by Morey Haber, CTO at BeyondTrust    When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while...

Cyber attacks, building a robust defence as easy as 1,2,3

by James Bergl, Director, Datto APAC The cybersecurity landscape in Singapore and the wider Asia-Pacific region continues to evolve, and the past two years have brought some of the worst...

Pages

Subscribe to RSS - Cyber Crime & Forensic