Links

  • Bryian Tan

    10 General Data Protection Regulation (GDPR) questions

    In case you missed it: 10 of your questions from our GDPR webinars
    Bryian Tan May 28, 2018
  • Bryian Tan

    D-Link router Vulnerability

    Using a D-Link router? Watch out for hardcoded backdoors that give hackers admin access. D-Link's DIR-620 routers contain four recently discovered firmware flaws that an attacker could use to t...
    Bryian Tan May 28, 2018
  • Willson-Yu Lin

    Adobe Flash Player gets update to fix two critical vulnerabilities

    Adobe has just released Adobe Flash Player 28.0.0.161,to fix two critical bugs spotted in the wild.
    Willson-Yu Lin Mar 19, 2018
  • Bryian Tan

    Cryptomining Supply Chain Attack Hits Government Websites

    This is another kind of supply chain attack that affects the “trusted relationship between software vendors or authors and their customers”. You trust a service distributing JavaScript to maintain...
    Bryian Tan Feb 11, 2018
  • Bryian Tan

    The Future of Authentication in a Hyper Connected World

    The Future of Authentication in a Hyper Connected World
    Bryian Tan Jan 04, 2018
  • Bryian Tan

    RAT Distributed Via Google Drive Targets East Asia

    Researchers said that they are tracking a new remote access Trojan dubbed UBoatRAT that is targeting individuals or organizations linked to South Korea or the video game industry.
    Bryian Tan Dec 06, 2017
  • Bryian Tan

    6 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online

    6 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online
    Bryian Tan Nov 23, 2017
  • Bryian Tan

    The top 10 worst ransomware attacks of 2017, so far

    Ransomware variants NotPetya, WannaCry, and Locky are among those that wreaked havoc for businesses worldwide this year.
    Bryian Tan Oct 31, 2017
  • Bryian Tan

    How To Phish Like The Bad Guys

    Learn how the adversary using social engineering techniques to exploit their victims.
    Bryian Tan Oct 09, 2017
  • Bryian Tan

    10 of the most dangerous malware threats on the internet today

    Not all malware threat receives high attention or makes the news but they been around for a while throughout various transformation from hackers.
    Bryian Tan Sep 29, 2017
  • Bryian Tan

    10 Tips For Reducing Insider Security Threats

    Insider threats can pose greater risks to company data than those associated with external attacks. Here are some techniques to help you spot and mitigate them as quickly as possible.
    Bryian Tan Sep 06, 2017
  • Bryian Tan

    10 browser extensions to keep you safe on the web

    This article from TechRepublic shared the tips on how to utilize the following browser extensions to help protect you from common threats from web sites.
    Bryian Tan Aug 29, 2017
  • Bryian Tan

    10 Tips: How to make your employees care about cybersecurity

    People are the biggest security vulnerability in any organization. Here's some expert advice on how to make cybersecurity training more effective and protect your business.
    Bryian Tan Jun 20, 2017
  • Bryian Tan

    WannaCry: The smart person guide

    WannaCry, also known as WannaCrypt, has spread around the world through a crafty attack vector and an ability to jump from machine to machine. Here's what you need to know about this security t...
    Bryian Tan Jun 15, 2017
  • Bryian Tan

    Webminar: Stopping Malware Before It Reaches Your Network

    Free Webinar: Stopping Malware Before It Reaches Your Network
    Bryian Tan May 23, 2017
  • Bryian Tan

    HP issues fix for 'keylogger' found on several laptop models

    HP issues fix for 'keylogger' found on several laptop models
    Bryian Tan May 11, 2017
  • Bryian Tan

    The godfather of ransomware returns: Locky is back and sneakier than ever

    The ransomware that drove last year's boom in file-encrypting malware is back, and this time it's even harder to detect.
    Bryian Tan Apr 26, 2017
  • Bryian Tan

    Security 101: BYOD Best Practices: What You Need to Know and Do

    Security 101: BYOD Best Practices: What You Need to Know and Do
    Bryian Tan Mar 25, 2017
  • Bryian Tan

    5 Security Questions For Your Hosting Company

    5 Security Questions For Your Hosting Company
    Bryian Tan Mar 21, 2017
  • Bryian Tan

    Deep Packet Inspection: The Smart Person's Guide

    This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.
    Bryian Tan Mar 10, 2017
  • View More