Disruptive.Asia
  • Home
  • News
  • Views
  • Features
  • Off the Wire
  • Videos
  • Events
  • Authors
  • About Us
    • About Us
    • Marketing Services

hacking

north koreans are jailbreaking phones
News

North Koreans are hacking their smartphones to access banned content

April 28, 2022 News Centre 0

Some tech savvy North Korean mobile users are managing to jailbreak their smartphones to circumvent tight government controls: report. Read more…

the little guy
Views

The little guy can still be a player in a world of state sponsored hackers

February 16, 2022 Alex Leslie 0

The little guy fights back. In a world where the focus is state sponsored hackers, there are stories out there that salute the little guy. Read more…

cybercrime
Views

Cybercrime Unicorns with great customer service, what next?

February 3, 2022 Alex Leslie 0

Cybercrime is already huge – and still growing at a phenomenal rate. It is also changing shape in scary ways. Read more…

air-gapping
Views

Air-gapping is no longer fool proof – basically nothing is safe anymore

December 6, 2021 Alex Leslie 0

Air-gapping was, for a long time, seen as the only real way of making systems ‘unhackable.’ Yet unconnected systems are now being breached. Read more…

ransomware is
Views

Ransomware is like a black hole, creating a dark vortex – is there hope?

November 15, 2021 Alex Leslie 0

Ransomware is so widespread and dangerous that it is pulling other dark arts into its orbit and creating an ecosystem that is causing global havoc. Read more…

hacking back
Views

Hacking back is a fantastic idea – no, wait it will usher in complete chaos

November 10, 2021 Alex Leslie 0

Hacking back is where companies under cyberattack can hack their attacker – great in theory, but bad and potentially dangerous in practice. Read more…

security must be
Views

Security must be built into everything because you never know what is next

September 7, 2021 Alex Leslie 0

Security must be discussed at the outset of everything. Examples are mounting of hackers reaping huge harvests from slack security practices. Read more…

DeFi platform crypto
News

DeFi platforms: the latest front in cryptocurrency’s hacking problem

August 16, 2021 News Centre 0

Cryptocurrency exchanges were the epicentre for cyberheists. Now, a bigger hacking risk is peer-to-peer crypto or DeFi platforms. Read more…

hackers now
Views

Hackers now hold the trump cards as attacks spiral out of control

August 16, 2021 Alex Leslie 0

It is clear that hackers now hold the trump cards, as attacks across every arena and sector of our world spiral into an uncontrollable mess. Read more…

tokens
News

Tokens worth $600 million stolen from DeFi cryptocurrency platform

August 11, 2021 News Centre 0

A cryptocurrency platform has lost an estimated $600 million in digital tokens after one of the sector’s biggest ever hacking attacks. Read more…

Posts navigation

1 2 … 5 »

Languages

en English
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeligeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu

Features

  • fraud digital identity
    Old-fashioned fraud was simple, today’s a very different story
    May 12, 2022 0
  • passwords
    You simply won’t believe the world’s most-used passwords
    May 10, 2022 0
  • green mobile networks
    Green mobile networks and how to become one?
    May 9, 2022 0
  • video analytics edge computing
    Video analytics can kickstart the edge opportunity for telcos
    April 26, 2022 0

Off the Wire

  • ZTE earns Indonesia’s ‘Global Champion’ award
    May 13, 2022 0
  • Singtel launches first all-in-one maritime service, iSHIP
    May 12, 2022 0
  • IPv6 Enhanced – boosting the digital economy
    April 7, 2022 0
  • AIS, Qualcomm and ZTE trial 5G NR-DC using 2.6 GHz and 26 GHz bands
    March 31, 2022 0

Videos

  • Japanes robot peels bananas
    Japanese robot peels bananas, sort of
    April 9, 2022 0
  • Elon Musk Twitter
    Elon Musk grabs 9% share of Twitter, now largest shareholder
    April 4, 2022 0
  • Malaysia's smart city communities
    Pushing Malaysia’s Smart City development in 2022
    March 8, 2022 0
  • digital divide ITU
    Closing the digital divide remains a major mission for the ITU
    February 23, 2022 0

Coming Events

  • Submarine Networks EMEA
    Submarine Networks EMEA 2022, London 16-18 May
    May 10, 2022 0
  • Satellite Industry Forum 2022
    Satellite Industry Forum 2022, Singapore 31 May
    May 9, 2022 0
  • 6th NXT CX Summit SEA 2022, Jakarta 15 June – Virtual 16th
    April 18, 2022 0
  • NGMN Industry Conference
    NGMN Industry Conference 2022, Paris 7-9 September
    April 14, 2022 0

Popular Posts

  • Loans to Singapore fashion technology startup Zilingo recalled
    Loans to Singapore fashion technology startup Zilingo recalled
  • Old-fashioned fraud was simple, today's a very different story
    Old-fashioned fraud was simple, today's a very different story
  • You simply won't believe the world's most-used passwords
    You simply won't believe the world's most-used passwords
  • Giddy promises of 5G remain unfulfilled in South Korea
    Giddy promises of 5G remain unfulfilled in South Korea

Get the app

Recent Comments

  • Jouko Ahvenainen on Hardware subscription model for iPhones – so crazy it just might work
  • Ruber on China pushing hard for swappable batteries in electric vehicles
  • John Galts on Deepfake Zelenskyy video a sign that digital disinformation will get worse
  • Brian Washburn on Telecom Asia magazine dead at 29: a eulogy

Archives

Popular Posts
  • Loans to Singapore fashion technology startup Zilingo recalled
    Loans to Singapore fashion technology startup Zilingo recalled
  • Old-fashioned fraud was simple, today's a very different story
    Old-fashioned fraud was simple, today's a very different story
  • You simply won't believe the world's most-used passwords
    You simply won't believe the world's most-used passwords
  • Giddy promises of 5G remain unfulfilled in South Korea
    Giddy promises of 5G remain unfulfilled in South Korea
  • Insurance companies must embrace user-held data models
    Insurance companies must embrace user-held data models
  • Twitter's legal team says Musk violated NDA as deal drama continues
    Twitter's legal team says Musk violated NDA as deal drama continues
  • Your guide to cyberbullying and how it can be prevented
    Your guide to cyberbullying and how it can be prevented
Recent Comments
  • Jouko Ahvenainen on Hardware subscription model for iPhones – so crazy it just might work
  • Ruber on China pushing hard for swappable batteries in electric vehicles
Important pages
  • About Us
  • Daily Snippets
  • Marketing Services
  • Privacy Policy
  • Terms and Conditions of Service

© Disruptive.Asia 2022

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}

Add our app

Install
×

Install this DisruptAsia on your iPhone and then Add to Home Screen

×