<
>

Is Disabling Your Macros Good Enough? Cybersecurity Experts Share Tips to Mitigate the Risk of Macro Based Attacks

Macros that are used in Microsoft Office documents, such as Word, Excel or PowerPoint, are convenient tools that allow users to use low-level programming to help automate repetitive tasks. However, the problem is that they are...

Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems

By Daniel Crowley, Research Director, IBM X-Force Red   Automation is pervasive across our modern world and building lobbies are the latest place affected by the changes. The friendly receptionist or security guard is...

Phishing 101: A Deeper Look at Phishing Attacks and How to Protect Your Business

Cybercrime is becoming an increasingly lucrative business and threat actors are finding new, innovative ways to get their hands-on valuable data or breach into personal, corporate or government networks. Just like premeditated...

Can Cybercriminals Hack Blockchain?

It’s a simple question with a perhaps not so simple answer. One of the problems with the mainstream understanding of blockchain is that it is still synonymous with cryptocurrencies like Bitcoin or Ethereum. In a recent...

Too Many Companies are Overlooking Servers in their Endpoint Security Strategy

By Sumit Bansal, Managing Director of ASEAN and Korean at Sophos Earlier this year, it was revealed that Malaysia’s central bank, Bank Negara Malaysia fell victim to a cyber-attack where hackers attempted to steal...

Cryptojacking Explained

Authored by Tirath Ramdas (tirath@marklar.co), Principle Consultant at Marklar Marklar Consulting Cryptojacking is a portmanteau of cryptocurrency and hijacking. When the exchange price of Bitcoin spiked in mid-2017 (lifting...

Safeguarding connected devices in the age of digital transformation

By Goh Chee Hoh, Managing Director, Trend Micro Malaysia   We've all heard about the inevitability of digital transformation. Technologies such as Internet of Things (IoT), big data analytics, blockchain, and mobile...

Cryptojacking Explained

With the dawn of cryptocurrency, a new form of hijacking has emerged. A way to steal power and resources from a computer to be used for bitcoin mining. Cryptojacking, can be done on any device that is able to browse the internet....

Cyber Safety Explained

Cyber Safety refers to the safe and responsible use of ICT.   Cyber Safety is not just about keeping systems and data safe, but its about using IT systems responsibly and treating other individuals and their data with...

5 Security Threats Looming in 2018

By Nigel Tan, GSI Business Development, Asia Pacific, IBM Security CYBERSECURITY became a household name in Malaysia in 2017 due to the record number of personally identifiable information that were exposed through major data...