Asian e-Marketing

freel

What needs to be considered in terms of data protection when cooperating with freelancers

Hiring freelancers has many advantages for companies: they do not have to pay social security contributions for them, they can be used flexibly, are often specialized in a certain subject area and can be implemented for projects that arise at short notice.

What needs to be considered in terms of data protection when cooperating with freelancers Read More »

globalD

Growing security risks to drive APAC managed security services revenue to US$17bn in 2024

Growing security risks and incidents of ransomware have been forcing enterprises across the Asia-Pacific (APAC) region to search for trusted and competent security services providers. Against this backdrop, managed security services (MSS) revenue in the region is estimated to reach US$17bn in 2024, according to the data and analytics company GlobalData.

Growing security risks to drive APAC managed security services revenue to US$17bn in 2024 Read More »

EAT

The importance of E-A-T in content creation

Google’s goal is to provide searchers with high-quality answers to every question they could possibly ask. To do this, it relies on a complex collection of rules and ranking factors. Some of these factors fall under the category of E-A-T, meaning Expertise, Authoritativeness and Trustworthiness.

The importance of E-A-T in content creation Read More »

4cyber

List of Asian countries most at risk of RDP brute-force attacks

The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been reliant on remote desktop connections to enable their employees to access their work computer from home. One of the most popular applications for accessing Windows workstations and servers is Microsoft’s remote desktop protocol (RDP), which

List of Asian countries most at risk of RDP brute-force attacks Read More »

onlineS

Malaysia successfully fighting streaming piracy

A new study, researching content viewing behavior of Malaysian consumers, has found a massive 64% decrease in consumers accessing piracy websites over the past 12 months, due to the Ministry of Domestic Trade and Consumer Affairs’ (MDTCA) site blocking efforts.The survey, commissioned by AVIA’s Coalition Against Piracy (CAP) and conducted by the international research and

Malaysia successfully fighting streaming piracy Read More »

wls cisco 3428611 fb

Novel Linux malware targets VoIP softswitches

ESET researchers have discovered a previously unknown Linux malware that targets Voice over IP (VoIP) soft switches. The malicious program was named by the analysts of the European IT security manufacturer CDRThief. It is designed to target a very specific VoIP platform, used by two China-produced softswitches (software switches): Linknat VOS2009 and VOS3000. A softswitch

Novel Linux malware targets VoIP softswitches Read More »

middle

Manipulated language AI can write manifestos that appear human and radicalize automatically

Shockingly, researchers at the Middlebury Institute of International Studies at Monterey, California, managed to teach Artificial Intelligence (AI) “GPT-3” to believe in the “QAnon” conspiracy theories that are widely spread on the Internet. Generative Pre-trained Transformer 3 (GPT-3) is an autoregressive language model that uses deep learning to produce human-like text. It is the third-generation

Manipulated language AI can write manifestos that appear human and radicalize automatically Read More »

ecommerce

Sentryc stops product piracy on the internet

Every year, brand abuse and product piracy result in losses of billions in e-commerce. The start-up Sentryc wants to change this by using AI to scan the Internet and remove plagiarism almost automatically. The young technology company, founded in 2019 and headquartered in Berlin, offers companies a unique digital solution with its proprietary brand protection

Sentryc stops product piracy on the internet Read More »

film

Fileless malware continues to grow

The effective and timely identification of malware is one of the greatest challenges for IT security today. This is not least due to the sheer number of new malware variants but also to their sophisticated obfuscation, which overwhelms conventional signature-based protection technologies. Mainly fileless malware is a growing problem here since it is not tied

Fileless malware continues to grow Read More »

competitive

Competitive advantage of cybersecurity often still undervalued

In times of increasing digitization and a steadily growing threat from cyberattacks, stable IT security is an important prerequisite for a functioning and growing business. Unfortunately, studies show that this insight has not yet reached all managing directors and board members, instead their concern is:

Competitive advantage of cybersecurity often still undervalued Read More »