2018

DOWNLOAD: Malware Trend Report H2 2017

About the OIC-CERT Malware Trend Report H2-2017 The OIC-CERT Malware Trend Report H2-2017 is the 3rd of its kind covering malware trends for the 2nd half of 2017. This is an outcome of the Malware Research and Coordination Facility project which is a collaborative effort from the Organisation of the Islamic Cooperation – Computer Emergency Response Team (OIC-CERT), the Asia Pacific Computer Emergency Response Team (APCERT) and other organisations of

How the Internet of Things is Changing the Future of the Supply Chain (Infographic)

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, or people provided with unique-identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. According to a report from Gartner, he predicts that in 2020, more than 50% of significant businesses processes will incorporate some form of the Internet of Things (IoT). Supply Chain Management has the

Facebook Password Stealing Apps Found on Android Play Store

Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently by two cybersecurity firms, Trend Micro and Avast, the malicious apps disguise as various

How Do VPNs Work?

We talk about VPNs (virtual private networks) a lot and how important they are to information security. But we rarely discuss how they work or what they’re doing. So today, we’re going to dive in a little deeper and attempt to visualize the process to get a better understanding of why we all should use VPNs, especially on public networks. VPNs For Beginners VPNs are subscription-based services that encrypt your

5 Common Cybersecurity Mistakes to Avoid in 2018

2017 brought new challenges for personal security, and 2018 will likely do the same. While we have little control over major data breaches as individuals, we do have control over our own personal security processes. Here are five common cybersecurity mistakes to avoid in the coming year and beyond. Connecting Everything That Can Be Connected How important is it to you that your eating utensil measures how quickly you consume food?

Best Security Practices for App Developers to Put End Users at Ease

As a result of the open source platform, Android apps are more vulnerable to security threats than their iOS counterparts. It’s no wonder Google is devoting significant attention to keeping up-to-date with newly discovered vulnerabilities, publishing regular news and security patches about compromised elements of the popular mobile software. The problem with cyber security threats is that tackling past mistakes is not enough. Mobile app developers need to think of