Home|Article
4 12, 2019

StrandHogg Vulnerability Exploited by Known Malwares

By |2019-12-26T00:54:25+08:00December 4th, 2019|Article|Comments Off on StrandHogg Vulnerability Exploited by Known Malwares

The new Android vulnerability discovered by Promon security researchers dubbed as StrandHogg is actively exploited by malwares to steal victims data. Both rooted and non-rooted devices running Android OS up to the latest Android 10 are impacted and vulnerable.. According to the security researchers, they found that all of the 500 most popular apps (as [...]

3 06, 2019

Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

By |2019-09-19T15:43:49+08:00June 3rd, 2019|Article|Comments Off on Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

With Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework coming into effect in 18July2019 , financial institutions now have more reasons than ever to protect the integrity of their network infrastructure. In order to achieve this protection, you’ll need a robust system in place to manage your PKI and certificate lifecycles. With the number [...]

17 05, 2019

What is FIDO U2F and how does it work?

By |2019-09-19T16:27:26+08:00May 17th, 2019|Article|Comments Off on What is FIDO U2F and how does it work?

The FIDO Alliance started as an answer to the security problems of typical username/password login procedures. Passwords are viewed as not very secure in the current age of digital security. Despite this, there have been a few barriers to the adoption of different and better authentication services. In the past, consumers did not enjoy their [...]

17 05, 2019

5 Important Facts To Kick Start Your Understanding On PKI

By |2019-06-28T16:35:16+08:00May 17th, 2019|Article|Comments Off on 5 Important Facts To Kick Start Your Understanding On PKI

As defined in Wikipedia, a public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Hence, PKI is not just the software which is a misconception of most people when it comes to understanding the real pain behind [...]

10 10, 2016

Central Bank Update a New Policy

By |2019-01-29T06:33:52+08:00October 10th, 2016|Article|Comments Off on Central Bank Update a New Policy

At the beginning of 2016, there was a surge of requests from financial institutions to upgrade the security features these requests range from enabling Multi-Factor Authentication (MFA) for Retail and/or Corporate Internet Banking Portals to Secure Remote Access Applications. The surge of requests may be attributed to the recent internet hacking incidents that made it [...]

19 07, 2016

Stay protected and avoid hackers from stealing your information

By |2019-01-29T07:58:57+08:00July 19th, 2016|Article|Comments Off on Stay protected and avoid hackers from stealing your information

Businesses like hospitals, governments, banks, academics, and corporations are mostly affected by the cyber attack and fraudulent transaction since these industries have vital data that provide precise, timely and absolute personal information shared by their customers. With the wide digital transformation, there are a lot of ways Cyber Criminals are using in stealing such data. [...]

17 05, 2016

The Importance of Software Protection in the Industry and Economy

By |2019-01-29T08:04:11+08:00May 17th, 2016|Article|Comments Off on The Importance of Software Protection in the Industry and Economy

According to software alliance, “more than four out of ten software programs installed on personal computers around the world were stolen, with a commercial value of more than $51 billion.” In this case, not only the revenue of the company is affected by this illegal activity but the economy as well. The most software firm [...]

17 05, 2016

Software Security through Hardware

By |2019-01-29T08:07:53+08:00May 17th, 2016|Article|Comments Off on Software Security through Hardware

Security is an issue that everyone would want to have and attain — may it be personal security, national security, network security, and information security, but in the advanced world of the software industry, the most vital of things to secure is the intellectual property. It is necessary for every Software Developers to have a [...]

12 05, 2016

How banks can protect their Filipino voters clients against Identity Theft/Fraud?

By |2019-01-29T08:11:58+08:00May 12th, 2016|Article|Comments Off on How banks can protect their Filipino voters clients against Identity Theft/Fraud?

In a recent report, 55 million Filipino voters information were leaked on the internet and those with bank accounts are now susceptible to fraud and another risk similar to identity theft. Names, Addresses, and Birthdates that are considered vital and valuable were exposed to the public which can be used to identity fraud. Identity fraud [...]