How Singtel Stopped a Major Cyberattack in Its Tracks
Singtel's experience with the Volt Typhoon attack serves as a critical reminder of the evolving threats facing telecommunications and other critical infrastructures.
Singtel's experience with the Volt Typhoon attack serves as a critical reminder of the evolving threats facing telecommunications and other critical infrastructures.
3 Reasons Why Your Payment App Needs EMVCo SBMP Certification [...]
Promon and i-Sprint recently uncovered a new Android malware spreading across Southeast Asia. Out of the 113 banking apps tested, an alarming 80.5% cannot protect against FjordPhantom.
According to IPH, it detected unauthorized access to its document management system which stored its own administrative documents as well as that its clients and their correspondences......
As the usage of our mobile devices shift from personal to business use, this poses a significant threat to corporate security due to its high touch points......
Mobile devices are no longer used just to take photos, make calls or send messages, with the advent of ever increasingly more powerful and feature-rich smart phones......
A recent news dated on 10th Mar 2023 from The Straits Times titled, The Big Story – Military Docs Leaked Online, where leaked confidential defence documents have been......
There is a growing need to adopt zero trust security principles due to today’s diverse, multi-cloud IT environments and hybrid workforces......
Recognizing that developers might neglect security in favor of other priorities, malicious threat actors regularly target security weaknesses in an attempt to exfiltrate data, take over mobile devices, or even infiltrate networks through backend servers. Mobile app security needs to become a central priority in the modern cyber threat landscape.
Mobile apps carry their own set of vulnerabilities. As developers, you hold the responsibility to step up and think ahead of unintended consequences when it comes to app security, and this includes identifying the common mobile app security threats and how to counter them.