Downloaded an Android antivirus lately? You might be in for a shock

Downloaded an Android antivirus lately? You might be in for a shock

Posted by SGCS Admin, 19-06-2017

Fake antivirus apps are a fresh malware plague When it comes to antivirus apps for Android, you need to be very careful about what you download onto your mobile device, as fresh research has pointed ...

Delete yourself from the internet by pressing this button

Delete yourself from the internet by pressing this button

Posted by SGCS Admin, 18-06-2017

The internet can be a beautiful and horrible place at the same time. It’s weird, and sometimes you feel like you want to leave. Sadly, there’s no easy way out — or there wasn’t...

Weak Development Security Exposes Web Apps to Cyber-Attacks

Weak Development Security Exposes Web Apps to Cyber-Attacks

Posted by JiongSeng, 17-06-2017

More than 90 percent of applications had unused code and 88 percent included vulnerable third-party libraries that leave websites open to cyber-attacks. Developers continue to leave the vast majority...

MHM Services Streamlines IT Business Operations, Prevents Ransomware Attacks with Barracuda Essentials

MHM Services Streamlines IT Business Operations, Prevents Ransomware Attacks with Barracuda Essentials

Posted by SGCS Admin, 16-06-2017

Singapore, June 16, 2017 – Barracuda Networks, Inc. (NYSE: CUDA), a leading provider of cloud-enabled security and data protection solutions, today announced that MHM Services, Inc., a leading p...

Ransomware Attack On University College London Causes Student And Staff Disruption

Ransomware Attack On University College London Causes Student And Staff Disruption

Posted by quinton7, 16-06-2017

UCL’s networked and shared drives have been shut off as it tackles the cyber attack   Students and academic staff from University College London (UCL) are facing disruption after a ransom...

Internal Audit’s Critical Role in Cybersecurity

Internal Audit’s Critical Role in Cybersecurity

Posted by paulsng33, 15-06-2017

In an ideal world, cybersecurity plans are well-designed, routinely tested, and executed flawlessly. Everyone knows their role and follows the policies and practices designed to protect the organizati...