Home|Article
3 06, 2019

Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

By |2019-09-19T15:43:49+08:00June 3rd, 2019|Article|Comments Off on Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

With Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework coming into effect in 18July2019 , financial institutions now have more reasons than ever to protect the integrity of their network infrastructure. In order to achieve this protection, you’ll need a robust system in place to manage your PKI and certificate lifecycles. With the number [...]

17 05, 2019

What is FIDO U2F and how does it work?

By |2019-09-19T16:27:26+08:00May 17th, 2019|Article|Comments Off on What is FIDO U2F and how does it work?

The FIDO Alliance started as an answer to the security problems of typical username/password login procedures. Passwords are viewed as not very secure in the current age of digital security. Despite this, there have been a few barriers to the adoption of different and better authentication services. In the past, consumers did not enjoy their [...]

17 05, 2019

5 Important Facts To Kick Start Your Understanding On PKI

By |2019-06-28T16:35:16+08:00May 17th, 2019|Article|Comments Off on 5 Important Facts To Kick Start Your Understanding On PKI

As defined in Wikipedia, a public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Hence, PKI is not just the software which is a misconception of most people when it comes to understanding the real pain behind [...]

10 10, 2016

Central Bank Update a New Policy

By |2019-01-29T06:33:52+08:00October 10th, 2016|Article|Comments Off on Central Bank Update a New Policy

At the beginning of 2016, there was a surge of requests from financial institutions to upgrade the security features these requests range from enabling Multi-Factor Authentication (MFA) for Retail and/or Corporate Internet Banking Portals to Secure Remote Access Applications. The surge of requests may be attributed to the recent internet hacking incidents that made it [...]

19 07, 2016

Stay protected and avoid hackers from stealing your information

By |2019-01-29T07:58:57+08:00July 19th, 2016|Article|Comments Off on Stay protected and avoid hackers from stealing your information

Businesses like hospitals, governments, banks, academics, and corporations are mostly affected by the cyber attack and fraudulent transaction since these industries have vital data that provide precise, timely and absolute personal information shared by their customers. With the wide digital transformation, there are a lot of ways Cyber Criminals are using in stealing such data. [...]

17 05, 2016

The Importance of Software Protection in the Industry and Economy

By |2019-01-29T08:04:11+08:00May 17th, 2016|Article|Comments Off on The Importance of Software Protection in the Industry and Economy

According to software alliance, “more than four out of ten software programs installed on personal computers around the world were stolen, with a commercial value of more than $51 billion.” In this case, not only the revenue of the company is affected by this illegal activity but the economy as well. The most software firm [...]

17 05, 2016

Software Security through Hardware

By |2019-01-29T08:07:53+08:00May 17th, 2016|Article|Comments Off on Software Security through Hardware

Security is an issue that everyone would want to have and attain — may it be personal security, national security, network security, and information security, but in the advanced world of the software industry, the most vital of things to secure is the intellectual property. It is necessary for every Software Developers to have a [...]

12 05, 2016

How banks can protect their Filipino voters clients against Identity Theft/Fraud?

By |2019-01-29T08:11:58+08:00May 12th, 2016|Article|Comments Off on How banks can protect their Filipino voters clients against Identity Theft/Fraud?

In a recent report, 55 million Filipino voters information were leaked on the internet and those with bank accounts are now susceptible to fraud and another risk similar to identity theft. Names, Addresses, and Birthdates that are considered vital and valuable were exposed to the public which can be used to identity fraud. Identity fraud [...]

14 10, 2014

Securemetric USB Based Products Are Not Affected By BadUSB Vulnerability

By |2019-01-30T01:55:28+08:00October 14th, 2014|Article|Comments Off on Securemetric USB Based Products Are Not Affected By BadUSB Vulnerability

On the 7th of August 2014 at the Black Hat 2014, German security firm Security Research (SR) Labs revealed one of the first USB vulnerabilities known as BadUSB where this malware is designed to attack the device itself instead of the data on the device. This means that this malware is capable of reprogramming the [...]

14 04, 2014

Security advisory regarding Heartbleed OpenSSL vulnerability

By |2019-01-30T02:08:11+08:00April 14th, 2014|Article, News|Comments Off on Security advisory regarding Heartbleed OpenSSL vulnerability

Certainly many of you likely read about the Heartbleed vulnerability that has affected much of the Internet. On Monday April 7th, security researchers reported the so-called Heartbleed bug in OpenSSL, which is a cryptographic library implementing the SSL/TLS security protocol. What is the Heartbleed bug? The Heartbleed Bug is vulnerability in the OpenSSL cryptographic software [...]