
Singapore businesses adjust to 'new normal' of sustained cyberattacks: poll
Posted by , 02-10-2019SINGAPORE businesses are adjusting to a "new normal" of sustained and sophisticated cyberattacks, according to a cyberthreat report that surveyed 252 C-suite technology executives. The report, releas...

New Bug Found in NSA’s Ghidra Tool
Posted by , 02-10-2019Flaw in National Security Agency’s Ghidra reverse-engineering tools allows hackers to execute code in vulnerable systems. A medium severity bug reported on Saturday impacts Ghidra, ...

Things you need to know about social media manipulation
Posted by , 02-10-2019Social media manipulation involves a series of techniques that abuse social media algorithms and automation to manipulate public opinion. This is usually done with a political or criminal motive an...

Massive data breaches in 2019 that occurred due to unprotected databases
Posted by , 02-10-2019Data breaches caused due to misconfigurations can have drastic consequences for big companies. The biggest data breach witnessed so far in 2019 is the exposure of 809 million records by an email ma...

Vengeful IT admin thrown behind bars for destroying Army systems on exit
Posted by , 02-10-2019A former systems engineer has wound up in prison after being found guilty of destroying critical US Army network resources in retaliation for termination. Last week, the US Department of ...

1.6 million Apple users are targeted by phishing attacks
Posted by , 30-09-2019The number of phishing attacks targeting users of Mac computers, iOS-based mobile devices, and the associated web services ecosystem to lure them into fraudulent schemes has reached 1.6 million in the...