Tag "Encryption"

Back to homepage
Industry Insights

Enterprise cybersecurity in the Asia-Pacific region

Almost one in five business organizations in the Asia-Pacific (APAC) region experienced more than six security breaches in the past two years, a new ESET enterprise cybersecurity survey has revealed.


5 Cyber Safety Rules Everyone Needs to Follow

Cybercriminals are not only focusing on enterprises and SMBs but also targeting individual end-users like you. Open Firefox Monitor, enter your email ID and see if it was the part of


Believe the hype, but control the threat: Reducing the risk of ransomware

Ransomware is becoming an epidemic for any collection or repository of data. Each day the attacks seem to be getting larger and more lucrative for cybercriminals. According to Europol’s annual report,


Drone Wars: Experts Warn of Flying Network Security Threat

Drones could become a major network security threat from 2020, forcing organization to guard the airspace around their buildings, security researchers have warned.  Small unmanned aerial vehicles (UAVs) will increasingly

Identity Theft Software


When it comes to cybersecurity tips, we are bothered about securing social media accounts or financial accounts. Cybercrime continues to evolve, surfacing new threats that are more complex every year.

Expert Articles

Shedding Light on the Cutting Edge of Cybercrime

By Christopher “Tophs” Elisan, Director of Intelligence, Flashpoint All too often, cyber-defence measures protect only against known threats. But since threat actors operating on the deep and dark web (DDW),

Software Vendor News

WhatsApp Sues Israeli Surveillance Firm over alleged Cyber Espionage

WhatsApp sued Israeli surveillance firm NSO Group on Tuesday, accusing it of helping government spies break into the phones of roughly 1,400 users across four continents in a hacking spree


Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security across the organization, according


Homeland Security, DoD, Transportation Officials Focus on Aviation Cyber Security

The Department of Homeland Security (DHS), the Pentagon, and the Department of Transportation (DOT) have been working since May to implement the cyber security goals of the National Strategy for Aviation


How long before quantum computers break encryption?

The verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet security. This comes straight from the National Academy of Science’s