Disruptive.Asia
  • Home
  • News
  • Views
  • Features
  • Off the Wire
  • Videos
  • Authors
  • About Us
    • About Us
    • Marketing Services

malware

mobile gaming malware
News

Malware attacks rise as mobile and PC gaming explode in Southeast Asia

August 24, 2021 Joana Bagano 0

With Southeast Asia’s emergence as a mobile gaming hub and the explosion of mobile games comes an unprecedented rise in cybersecurity attacks Read more…

EMOTET
Views

The disruption of EMOTET is good but the end will never be in sight

February 1, 2021 Alex Leslie 0

The joint operation that brought EMOTET to its knees deserves congratulations. It was, one of the single largest cyber threats out there. Read more…

EMOTET
News

EMOTET, world’s most dangerous malware disrupted through global action

January 28, 2021 News Centre 0

Law enforcement and judicial authorities worldwide have this week disrupted one of the most significant botnets of the past decade: EMOTET. Read more…

Pakistan Adroid apps
Views

Android users in Pakistan face dangerous apps that hide in plain sight

January 19, 2021 Alex Leslie 0

Android smartphone users are used to being told that their devices are vulnerable but now new digital horrors have sprung up in Pakistan. Read more…

IoT attacks
Views

Nokia reports spike in IoT attacks but telcos are holding up

October 28, 2020 Alex Leslie 0

Not surprisingly, IoT attacks and devices being infected by malware are up as a result of the pandemic, according to Nokia. Read more…

User Isolation Protection UIP
Views

User Isolation Protection (UIP) – the new term in cybersecurity

May 6, 2020 Guest Writer 0

The biggest cybersecurity vulnerability for any platform is now the user, that’s why we need User Isolation Protection or UIP. Read more…

EventBot malware Trojan
Views

Why should the latest mobile banking Trojan, EventBot, concern telcos?

May 4, 2020 Guest Writer 0

A newly-created mobile banking Trojan, named EventBot, can not only grab passwords, but also intercept two-factor authentication codes as well Read more…

News

Android apps in APAC vulnerable to serious flaw – StrandHogg

December 9, 2019 News Centre 0

Android flaw named StrandHogg discovered after it attacked customer bank accounts by allowing real-life malware to pose as hundreds of legitimate apps. Read more…

Cyberattack
Views

Does security have a chance against the new, new technology?

November 15, 2019 Alex Leslie 0

A new security threat report highlights how the latest defences against cyberattack are themselves under threat. Read more…

Baldr
Off the Wire

Baldr is a threat aimed at gamers – and it’s serious

August 9, 2019 News Centre 0

SophosLabs has been tracking the activity of a malware family Baldr that, initially at least, targeted gamers through the use of misleading online videos. Read more…

Off the Wire

Kaspersky Lab says ‘FinSpy’ malware spreading

July 18, 2019 News Centre Comments Off on Kaspersky Lab says ‘FinSpy’ malware spreading

Kaspersky Labs says UK-based Gamma Group’s notorious surveillance malware program FinSpy can read secret chats and it’s spreading. Read more…

Off the Wire

Malware detections in APAC on the rise – report

April 30, 2019 News Centre 0

In the first quarter of 2019, the APAC region has seen business malware detections on the rise, a trend that is observed globally – Malwarebytes report. Read more…

News

Malware added to over one million Asus computers by hijackers

March 27, 2019 News Centre 0

Hackers were able to deliver malware to more than one million Asus computer owners last year by hijacking the company’s software update system Read more…

Features

Malware targeting businesses in Asia Pacific increases by 270%

March 11, 2019 News Centre 0

Report identifies a sharp increase in business-based malware detections in Asia Pacific region that remains a prime target. Read more…

security
Views

Amid the technology hype let’s not forget security (ever)

March 4, 2019 Alex Leslie 0

The rise of connected things drags with it discussions about security. The list of threats is long and sadly any list of counter measures is pretty short. Read more…

Languages

Features

  • A 5G network in one of the world’s most remote regions
    September 16, 2023 0
  • APAC CDOs struggle to balance innovation and governance
    August 30, 2023 0
  • Telcos to techcos: what’s needed for success?
    August 29, 2023 0
  • Is it possible to train new AI with existing AI models?
    August 18, 2023 0

Off the Wire

  • China Mobile, ZTE verify digital twin cooperation model
    August 1, 2023 0
  • ZTE releases “Digital Infrastructure Technology Trends”
    July 12, 2023 0
  • ZTE shines at MWC Shanghai 2023 shaping digital innovation
    June 28, 2023 0
  • ZTE named to Fortune China ESG Influential List again
    May 12, 2023 0

Videos

  • A 5G network in one of the world’s most remote regions
    September 16, 2023 0
  • Nokia is deploying the first cellular network on the Moon
    August 7, 2023 0
  • Zhang Jianpeng ZTE interview 5G ICT
    Interview – ZTE’s Zhang Jianpeng on 5G and ICT advancements
    June 26, 2023 0
  • AI for Good
    AI for Good Global Summit 2023 – what’s in store?
    June 5, 2023 0

Popular Posts

  • A 5G network in one of the world's most remote regions
    A 5G network in one of the world's most remote regions
  • All good things must end - including Disruptive.Asia
    All good things must end - including Disruptive.Asia
  • Digital clones - who owns and uses yours?
    Digital clones - who owns and uses yours?
  • The Metaverse is chugging along, but does anyone care?
    The Metaverse is chugging along, but does anyone care?

Recent Comments

  • Ben Bannister on All good things must end – including Disruptive.Asia
  • Unknown Comedian on All good things must end – including Disruptive.Asia
  • Peter Coleman on All good things must end – including Disruptive.Asia
  • Dami on Is GPT-3 conscious? The debate about AI gets more intense

Archives

Popular Posts
  • A 5G network in one of the world's most remote regions
    A 5G network in one of the world's most remote regions
  • All good things must end - including Disruptive.Asia
    All good things must end - including Disruptive.Asia
  • Digital clones - who owns and uses yours?
    Digital clones - who owns and uses yours?
  • The Metaverse is chugging along, but does anyone care?
    The Metaverse is chugging along, but does anyone care?
  • APAC CDOs struggle to balance innovation and governance
    APAC CDOs struggle to balance innovation and governance
  • Telcos to techcos: what's needed for success?
    Telcos to techcos: what's needed for success?
  • Globe releases enhanced environmental policy
    Globe releases enhanced environmental policy
Recent Comments
  • Ben Bannister on All good things must end – including Disruptive.Asia
  • Unknown Comedian on All good things must end – including Disruptive.Asia
Important pages
  • About Us
  • Marketing Services
  • Newsletters
  • Privacy Policy
  • Terms and Conditions of Service

© Disruptive.Asia 2023

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}