Tuesday Sep 01st

Latest News

  • The inconvenient truth about cyber fraud

    The inconvenient truth about cyber fraud

    The need to feel safe and secure has its origins at the earliest steps of our development, which makes sense, as we most probably wouldn’t survive otherwise. The same applies for our digital world, where we have to be constantly on alert over potentially falling prey to cyber criminals. With more and more interactions and transactions taking place through anonymous online and mobile channels, cyber criminals unfortunately have a growing number of opportunities to reap financial rewards at the expense of others. Hence, the first step for those tasked with protecting their organizations and customers should make sure there has not already been a security breach or that accounts already have been compromised.

  • ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia

    ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia

    According to the Asia Cyber Savviness Report, released by ESET, 93% of online users in Asia worry about cyber security. In its recent report, the global provider of security solutions highlights that the region still has a long way to go in understanding online security and protecting themselves.

  • Hackers look for high damage potential and weak safety precautions

    Hackers look for high damage potential and weak safety precautions

    Hacks can paralyze websites or allow data theft, harming the reputation and consequently sales of concerned companies enormously. In the following, we take a look at the procedures of cybercriminals and their goals, as well as defence against the dreaded DDoS attacks.

  • Frost & Sullivan identified top performers of the Asia Pacific Web Application Firewall market

    Frost & Sullivan identified top performers of the Asia Pacific Web Application Firewall market

    The Asia Pacific Web Application Firewall (WAF) market grew 34% in the past two years, reaching a total market size of $155.6 million in 2014, according to the analysts of Frost & Sullivan. The strong growth momentum was driven by the rise in eCommerce and Internet banking activities over the past few years and the necessity of employing the right prevention measures.

  • Digital carelessness is still rampant

    Digital carelessness is still rampant

    Business- and production processes can’t be run without information technology anymore and digital marketing is definitely sitting in the front row here. However, although the risks of cyberattacks can threaten the existence of companies, many still don’t seem to be sufficiently aware of them.

  • Sensitive credentials are the keys to large amounts of critical data, according to hackers

    Sensitive credentials are the keys to large amounts of critical data, according to hackers

    “In today’s cybersecurity arena, the notion of using a traditional perimeter firewall as your primary line of defense is no longer the impenetrable wall it used to be, as hackers and malicious actors consistently find ways to sneak past the first trusted layer of defense”, states Thycotic, a provider of smart and effective privileged account management solutions. Rather, it even seems that the more security solutions and tools are deployed, the more vulnerabilities are introduced that can lead to network penetration, the company claims.

  • Stagefright steals information remotely from Android devices

    Stagefright steals information remotely from Android devices

    Stagefright, a vulnerability that allows attackers to steal information from Android devices, was discovered just a couple of weeks ago. This flaw allows attackers to steal information from Android devices through remotely executed code via a maliciously crafted multimedia messaging service message (MMS).

  • Prevent data loss, security and compliance breaches by controlling every file that passes through your mobile devices

    Prevent data loss, security and compliance breaches by controlling every file that passes through your mobile devices

    Vaultize, a leader in enterprise file security, provides a mobile content management (MCM) platform facilitated through data access rights that allows corporate IT to prevent data loss on their mobile devices. In fact, Vaultize allows granular control over every file that passes through it, including whether files can be copied/pasted, shared, printed, emailed or opened in a third-party mobile app and more. This is possible through policy-driven control over the Vaultize mobile app and its built-in document editor.

  • Deloitte reveals the top challenges of Chief Information Security Officers (CISOs)

    Deloitte reveals the top challenges of Chief Information Security Officers (CISOs)

    "An effective CISO can no longer rely on his or her technical expertise alone. They must understand how strategic initiatives create risks and develop security programs that balance the need to drive business performance with the growing realities and complexities of protecting customers, intellectual property, and brand", explains Ed Powers, principal, Deloitte & Touche LLP and U.S. leader of cyber risk services.

  • Acronis provides complete protection both locally and in the cloud

    Acronis provides complete protection both locally and in the cloud

    Acronis, a global leader in new generation data protection, just announced the release of Acronis True Image Cloud and Acronis True Image 2016.

    Powered by the AnyData Engine and set apart by its image technology, Acronis delivers easy, complete and safe file access and sharing, as well as backup and recovery of all files and entire systems across any environment—virtual, physical, cloud and mobile.

  • Best practice for DNS attack mitigation

    Best practice for DNS attack mitigation

    The Domain Name System (DNS) is one of the most important services in IP-based networks and a prime target for hackers. Therefore, you might be interested in the following few useful tips to minimize the risks of DDoS and mitigate damage.

  • Cireson increases security with new Password Reset app

    Cireson increases security with new Password Reset app

    The Microsoft Cloud and System Center expert, Cireson, revealed its new Password Reset app, which is part of the much-anticipated Identity Management Solution for Microsoft System Center Service Manager. The launch comes after the recent unveiling of the Cireson Platform, which combines the very best of service, asset, and now their first release in the identity management space.

  • Important IT security factors for compliance requirements

    Important IT security factors for compliance requirements

    In today’s highly connected world, security and privacy are paramount, and security-conscious organizations depend on solutions to keep their data safe and their information private.

    Without doubt, the need for protection is growing, with passwords and access restrictions that are unfortunately often not safe, although the laws require the highest level of security when it comes to data protection. Not to mention, that there are compliance requirements for all areas where computers are used. In fact, the safety requirements for data storage and forwarding are becoming more stringent and more and more demanding to fulfil.

  • Closing security gaps is the biggest challenge of the Internet of Things

    Closing security gaps is the biggest challenge of the Internet of Things

    The consumer electronics giant Samsung just announced that it expects 90% of its devices to be connected to the Internet of Things by 2017, which corresponds with Cisco’s prediction of having 50 billion connected devices by the end of the decade. Quite obviously, the Internet of Things (IoT) is progressing at a rapid pace. Even from an economic point of view, the Internet of Things seems a strong growth driver, with current studies assuming that it will contribute to the global economic output USD 14.2 bn. until 2030.

  • Does data protection really loom large these days?

    Does data protection really loom large these days?

    When it comes to privacy laws, they often collide in different countries in the truest sense of the word. There are quite rigid requirements on the one hand and broad, interpretable laws, that allow unrestricted government access, on the other hand. However, to what extend do strict laws protect?

  • Advanced Persistent Threat (APT)

    Advanced Persistent Threat (APT)

    Advanced Persistent Threats (APTs) exploit the key weaknesses of today’s common IT infrastructures in order to steal intellectual property and sabotage business-critical production environments, explains Imperva, a leading provider of cyber security solutions. The company is specialized in protecting business critical data and applications—in the cloud and on-premises – and therefore a good source for finding out all about APT.

  • Bypass luring online dangers

    Bypass luring online dangers

    Malicious software, in the form of Trojans and worms, is still the greatest threat on the Internet: Trojans perform dangerous actions unnoticed on affected devices, while worms spread themselves over the Internet and can damage infected computers.

  • The ultimate web attack survival kit and loads of good advice

    The ultimate web attack survival kit and loads of good advice

    We have always to discern between good and evil, right? Well, our digital and technology-driven world is no exception. Here, we have to differentiate between good and evil bots: Some are helpful and facilitate our daily lives; others are not to be trifled with. The bad bots are often machines that are designed for only one purpose - causing as much damage as possible.

  • Integrated approach to safety issues is crucial for smart city initiatives

    Integrated approach to safety issues is crucial for smart city initiatives

    With recent reports predicting that the Asia Pacific region will see the largest growth in smart city initiatives over the next 10 years, many have focused on the cost saving benefits and efficiencies that technology can deliver. In fact, a recent report predicted the number of smart cities worldwide to quadruple over the next ten years, with Asia Pacific expected to see the highest number of smart cities, reaching 32 by 2025, ahead of Europe and the Americas.

This week's highlights

The inconvenient truth about cyber fraud

Category: August 2015 - Security
The need to feel safe and secure has its origins at the earliest steps of our development, which makes sense, as we most probably wouldn’t survive otherwise. The same applies for our digital world,
Read more...

ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia

Category: August 2015 - Security
According to the Asia Cyber Savviness Report, released by ESET, 93% of online users in Asia worry about cyber security. In its recent report, the global provider of security solutions highlights that
Read more...

Hackers look for high damage potential and weak safety precautions

Category: August 2015 - Security
Hacks can paralyze websites or allow data theft, harming the reputation and consequently sales of concerned companies enormously. In the following, we take a look at the procedures of cybercriminals a
Read more...
View More Articles

Previous articles

Consumers are developing into information deniers - real-time marketing could reverse that trend

Category: July 2015: Real (Right)-Time Marketing
People are less and less willing to accept impersonal and general advertising messages due to increasing information overload of marketing communications across a constantly growing number of media. H
Read more...

The time has come: Windows 10 better than ever and available as a free upgrade

Category: July 2015: Real (Right)-Time Marketing
Microsoft Corp. just announced the availability of Windows 10 as a free upgrade or with new PCs and tablets, which includes innovations such as Cortana, an Xbox app and Microsoft Edge for a familiar,
Read more...

Nexmo Integrates Viber into Chat App API

Category: July 2015: Real (Right)-Time Marketing
Brands can now easily engage their customers with Viber by using Nexmo’s Chat App API It is well known that Asia is mobile first, which means for marketers to be focused on mobile devices to find a
Read more...
View More Articles

Previous month's highlights

Creepy or Cool: How consumers perceive in-store personalization

Category: May 2015 - Website- & Hyper-Personalization

RichRelevance, the global leader in omnichannel personalization, just released a new study titled “Creepy or Cool” that reveals consumer attitudes towards digital enhancements to the in-store shopping experience.

What "Customer Centricity" means for e-businesses

Category: May 2015 - Website- & Hyper-Personalization

The importance of customer relations has reached a new dimension and both B2C and B2B companies have to rise to the challenges. The following four key success factors may help you to achieve centricity for your customers consistently and continuously.

Privacy is the key element of the ‘Shadow Project’

Category: May 2015 - Website- & Hyper-Personalization

Privacy is a universal right, therefore building anonymous systems and defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money should be on top of everybody’s mind.

New malware family, the Linux/Moose, performs fraud on social networks and steals network traffic

Category: May 2015 - Website- & Hyper-Personalization

Researchers at ESET, a global leader in proactive digital protection, has discovered a new malware family, the Linux/Moose, which targets Linux-based consumer routers and infects Linux-based embedded systems in its path. The goal is to infect social network accounts such as Facebook and Twitter, so they can be used for fraud.

View More Articles

LATEST EMAGS

PREVIOUS EMAGS

About Us

MediaBUZZ Pte Ltd is an independent online publisher in the Asia Pacific region, focusing on the business of digital media and marketing, since early 2004.

 

Asian emarketing logo

Asian e-Marketing is a true pioneer in Asia Pacific’s digital marketing scene, empowering e-marketers in the vibrant and fast-paced electronic marketing environment. Key sections include e-marketing tips, best practices and trends/statistics, legislation affecting e-marketing, training the spotlight on companies and their e-marketing campaigns and e-marketing leadership profiles.

Locate Us

United House, #03-05, 20 Kramat Lane, S(228773)

Contact Us

MediaBUZZ Pte Ltd

Reg. No. 200407301C

Phone: +65 6836 1807

Fax: +65 6235 1706

General Contact: info[at]mediabuzz.com.sg