TikTok

How to Protect Your TikTok Account from Hackers

TikTok, a mobile video-sharing service owned by Beijing-based technology company ByteDance, has been around since 2016. Its popularity shifted into hyper-drive over the past two years, with the user count exceeding 2 billion (according to Craig Chapple, a mobile insights strategist) globally at the time of this publication. TikTok generated a whopping 315 million installs in […]

Cybersecurity, Modern Technology and Business Threats

The year 2020 is overcome with the COVID-19. But the virus isn’t the only threat to our security. 2020 is also set to revolutionize the world with advancements that will shape the future of lives and businesses, alike. We now have 5G and IoT to Artificial Intelligence, Cloud technology, and Machine Learning. These technologies will […]

protect your domain name system

How to Protect Your Domain Name System From Hijacking

Large-scale domain name system hijackings — usually in the form of DNS spoofing or DDoS attacks — have been on a steady rise for years. But the unprecedented number of DNS hijackings in 2019 has prompted the U.K.’s National Cyber Security Centre to alert and advise organizations on the threat. Learn how to protect your domain name system […]

IoT Security Concerns

Are Solutions Keeping Up with IoT Security Concerns?

The Internet of Things (IoT) has gone from a futuristic buzzword to becoming a reality. IoT security has become an industry on to itself. By 2020, Gartner expects there will be 20 billion IoT “things” in use. These IoT “things” do not include smartphones and PCs. They are everyday devices, such as appliances, cars, and […]

6 Emerging Cyber Threats to Lookout for in 2019

2018 showed us an accelerated growth in cyber threat activities. Data breaches, attacks using malicious software and insider threats were among the most familiar forms of attack. Many well-known organizations suffered from these cybersecurity disasters and compromised data of millions of users. Exactis, a marketing and data aggregation firm suffered the largest data leak of […]

better inroads to cyber security

Operational Technology in Industrial IoT Can’t Tolerate IT-Style Patching. “Threat Analysis” is a Safe and Powerful Solution

Speaking about the Industrial Internet of Things – (IIoT). Operational technology in industrial internet of things (IoT) can’t tolerate IT style patching. Using “Threat Analysis” is a Safe and Powerful Solution. Within companies and across the entire global the IIoT ecosystem – is an intricately intertwined and negotiated merger of IT and OT. OT systems are […]

cyber attacks from iot

Is more IoT driving more cyber attacks?

The WannaCry ransomware attack from this May made the whole world think about cyber security issues once again. Another unique point for WannaCry versus previous cyber attacks is IoT also got involved with the crisis as well. We learned from the news reports that this worm virus was different from usual. It had not only tried to […]

google-waymo-self-driving-fiat-minivan

Google’s Waymo self-driving cars kept offline to avoid hackers

Google’s self-driving division, Waymo, has revealed that its cars receive limited internet access to minimize the window for hackers to penetrate the system. “Our cars communicate with the outside world only when they need to, so there isn’t a continuous line that’s able to be hacked, going into the car,” said Waymo CEO John Krafcik […]

RW Q&A: Singapore’s CIO weighs in on IoT and smart cities

Singapore, the booming Asian city-state, is one of the world’s leading smart cities. With technology-driven government projects stretching back decades, it remains at the forefront of global smart city innovation. To further its ambitious Smart Nation 2025 plan, Singapore recently launched two new agencies focusing on innovation-related aspects of this complex smart city strategy, one of […]

AI detects cyber attacks with accuracy after attending MIT

AI detects cyber attacks with accuracy after attending MIT

Researchers with MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have announced a breakthrough in cyber threat detection that promises to dramatically lower the amount of time human analysts spend sorting through information in search of evidence of cyber attacks. IT analysts spend countless hours scouring through mountains of data in order to find evidence […]