Feature

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

Patch expert calls on Microsoft execs to fix Windows updating

IT admins surveyed by Susan Bradley, who moderates the PatchManagement.org mailing list, said Microsoft's current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes.

By 2020, 1-in-5 healthcare orgs will adopt blockchain; here’s why

Blockchain lets the healthcare industry exchange data in a standard format, automate complex processes and apply AI against large silos of medical data. It might even allow patients to sell their data for rewards.

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

California Consumer Privacy Act: What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Android security: Analysis, advice, and next-level knowledge

Expand your Android security knowledge with this comprehensive collection of level-headed resources.

The biggest data breaches in the ASEAN region

Why data breaches are a major problem in the ASEAN region & a list of the most serious incidents in the recent years

Does your organisation need a CISO?

How rising data security fears have boosted the role of the Chief Information Security Officer

Blockchain beyond Bitcoin: How Singapore is using blockchain outside of cryptocurrencies

Blockchain is not bitcoin and the digital ledger’s uses go far beyond cryptocurrencies

How to Mine Ethereum

As one of the largest Cryptocurrencies in the world, Ethereum is helping to pave the way for wider adoption of blockchain technology. If you’d like to be a part of this and mine Ethereum, then we’ve put together this guide to help get you started.