Home|Article
27 05, 2020

27 May 2020 -New Android Bug Lets Malware Pose As Real Apps To Steal User Data

By |2020-05-29T02:15:18+08:00May 27th, 2020|Article|Comments Off on 27 May 2020 -New Android Bug Lets Malware Pose As Real Apps To Steal User Data

A new Android bug has been discovered by security researchers from Promon. The bug allows malware attacks almost any app and steals passwords and other sensitive information from the device. According to Techcrunch‘s latest report, all devices running Android 9.0 and earlier versions are vulnerable. This new bug named "Strandhogg 2.0". Note: StrandHogg 2.0 is [...]

15 05, 2020

*The Star news : Dump your passwords, improve your security. Really

By |2020-05-15T18:06:37+08:00May 15th, 2020|Article|Comments Off on *The Star news : Dump your passwords, improve your security. Really

The news mentioned Passwords/weak passwords are a pain for many organizations. "Services from Google, Facebook, and Apple allow you to use your passwords for their services at other sites, but you have to give them even more power over your life online." Are you looking for something balance between privacy and security, FIDO is the [...]

29 01, 2020

Securemetric has launched its cloud-based security-as-a-service solutions platform-CENTAGATECLOUD

By |2020-01-30T08:37:42+08:00January 29th, 2020|Article|Comments Off on Securemetric has launched its cloud-based security-as-a-service solutions platform-CENTAGATECLOUD

16 Jan 2020, Digital security firm Securemetric Bhd has launched its cloud-based cybersecurity platform CENTAGATECLOUD. CENTAGATE, which is short for Centralised Authentication Gateway, manages user authentication and supports multi-factor and multi-channel authentication. It allows enterprises to establish a single authentication platform for enterprise-wide applications. All enterprises are encouraged to sign up with CENTAGATECLOUD's account to [...]

4 12, 2019

StrandHogg Vulnerability Exploited by Known Malwares

By |2019-12-26T00:54:25+08:00December 4th, 2019|Article|Comments Off on StrandHogg Vulnerability Exploited by Known Malwares

The new Android vulnerability discovered by Promon security researchers dubbed as StrandHogg is actively exploited by malwares to steal victims data. Both rooted and non-rooted devices running Android OS up to the latest Android 10 are impacted and vulnerable.. According to the security researchers, they found that all of the 500 most popular apps (as [...]

3 06, 2019

Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

By |2019-09-19T15:43:49+08:00June 3rd, 2019|Article|Comments Off on Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

With Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework coming into effect in 18July2019 , financial institutions now have more reasons than ever to protect the integrity of their network infrastructure. In order to achieve this protection, you’ll need a robust system in place to manage your PKI and certificate lifecycles. With the number [...]

17 05, 2019

What is FIDO U2F and how does it work?

By |2019-09-19T16:27:26+08:00May 17th, 2019|Article|Comments Off on What is FIDO U2F and how does it work?

The FIDO Alliance started as an answer to the security problems of typical username/password login procedures. Passwords are viewed as not very secure in the current age of digital security. Despite this, there have been a few barriers to the adoption of different and better authentication services. In the past, consumers did not enjoy their [...]

17 05, 2019

5 Important Facts To Kick Start Your Understanding On PKI

By |2019-06-28T16:35:16+08:00May 17th, 2019|Article|Comments Off on 5 Important Facts To Kick Start Your Understanding On PKI

As defined in Wikipedia, a public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Hence, PKI is not just the software which is a misconception of most people when it comes to understanding the real pain behind [...]

10 10, 2016

Central Bank Update a New Policy

By |2019-01-29T06:33:52+08:00October 10th, 2016|Article|Comments Off on Central Bank Update a New Policy

At the beginning of 2016, there was a surge of requests from financial institutions to upgrade the security features these requests range from enabling Multi-Factor Authentication (MFA) for Retail and/or Corporate Internet Banking Portals to Secure Remote Access Applications. The surge of requests may be attributed to the recent internet hacking incidents that made it [...]

19 07, 2016

Stay protected and avoid hackers from stealing your information

By |2019-01-29T07:58:57+08:00July 19th, 2016|Article|Comments Off on Stay protected and avoid hackers from stealing your information

Businesses like hospitals, governments, banks, academics, and corporations are mostly affected by the cyber attack and fraudulent transaction since these industries have vital data that provide precise, timely and absolute personal information shared by their customers. With the wide digital transformation, there are a lot of ways Cyber Criminals are using in stealing such data. [...]