Archive for the ‘Tips’ Category

Trend Micro exposes undetectable malware against bank session tokens

Wednesday, July 23rd, 2014

Are your devices infected? “Operation Emmental” is a new criminal operation which targets banks that use session tokens such as Short Message Service (“SMS”) for authentication purposes – to steal customers’ online banking credentials to gain full access and control of their bank accounts.

A comparison between the two-factor authentication process in uninfected and infected computers with Operation Emmental.

A comparison between the two-factor authentication process in uninfected and infected computers with Operation Emmental.

Like Swiss Emmental cheese, the ways in which your online banking accounts are protected might be full of holes, or rather loopholes.

Commenting on today’s rampant mobile cybercrimes, Paul Oliveria, Technical Communications Manager of Trend Labs, Trend Micro shared: “Monetary benefits remain the biggest motivation for cybercriminals. Based on Trend Micro TrendLabs 1Q 2014 Security Roundup report, the number of online banking malware detections in the first quarter reached roughly 116,000 showing a steady increase from the same quarter in 2013.”

Cloud security experts Trend Micro warns of “undetectable” malware infection that targets mobile banking users.

Currently prevalent in Austria, Sweden and Switzerland, this cybercrime has reached Japan, leaving the Asia Pacific region at greater risk of a similar attack.

Mobile devices are also increasingly being included in cross-platform threats.

With mobile devices no longer being just phones and serve as computer substitutes in their own right, users are often connecting their mobile devices to their home/work systems to sync their files and documents.

This link between the devices is what threats use to jump across.

(more…)

Palo Alto Networks on protection against IE vulnerabilities

Sunday, July 20th, 2014

Earlier this month, Palo Alto Networks discovered ten critical vulnerabilities in Internet Explorer browsers, underlining the importance for businesses to focus on knowing the risk of running vulnerable software.

Check out five core concepts on how to protect your organisation against vulnerabilities.

Check out five core concepts on how to protect your organisation against vulnerabilities.

Sharat Sinha – Vice President, Asia Pacific for Palo Alto Networks – shares his views on how businesses and organisations can protect themselves against malicious attacks and avoid compromises to their network security.

Below are Sinha’s views.

(more…)

EZ-Link gives away 1 million FREE cards & how to get YOURS

Friday, July 4th, 2014

EZ-Link has more than a million ez-link cards to give away and it will take place over a six-month period from July till December 2014. Eligible cardholders can get their free cards at TransitLink Ticket Offices as well as roadshows.

Find out how to get your FREE EZ-Link card below.

Find out how to get your FREE EZ-Link card below.

The ‘Journey with EZ-Link’ giveaway campaign offers free cards for holders of cards expiring in 2014 plus other value-added services for all its cardholders.

The details on how and where to get your free card is in the press release below.

(more…)

Tips: Google’s seven top tips for Safer Internet Day

Tuesday, February 11th, 2014

Since today is “Safer Internet Day”, here are seven “Don’t” tips from Google that can help you stay safe on the Internet.

Are you ready for a Safer Internet?

Are you ready for a Safer Internet?

Here are seven tips from Google of things you need to start doing right away to stay safe online.

  1. Don’t use the same password for everything: It’s like handing your house keys (and every other key) to everyone you meet.
  2. Don’t have an “easy” password: If your password contains the word ‘password’ or numbers in sequence, think again. One way to create (and remember) a complex password is to think of a phrase or sentence (perhaps the lyrics to a song you like?) and use the first letter of each word to create the password. Or think of places you’ve lived, and spell them backwards. Something, anything!

  3. Don’t rely solely on a password: It’s so yesterday to have only a password for your most important accounts. Turn on two-factor authentication. Like your bank’s OTP, an SMS code or mobile app that gives you a second code when you’re accessing your account from an unfamiliar computer will give you extra peace of mind.
  4. (more…)