• Thursday
  • April 17, 2014
  • Last updated: 2:08am
Hong Kong

Humidity 

UV 

Pollution 

Refine Your Search

Sort by

Search Results

Results 1 - 10 of 24 for cyber espionage

Search results

  1. Vulnerable companies should step up defences

    Posted Sep 05th 2011, 12:00am

    ... Network Box's real-time PUSH update technology provides round-the-clock monitoring and dedicated remote management, which protects against known and unknown cyber threats. Categories ...

    http://www.scmp.com/article/978146/vulnerable-companies-should-step-defences
  2. Cyber thieves get clever

    Posted May 08th 2012, 12:00am

    ... Network safety has become the top priority for companies as cyber theft has increased markedly over the years. Despite firewalls, cyber criminals have penetrated well-protected websites. A recent study conducted by Websense Security Labs outlines the reasons. The 'Websense 2012 Threat Report' says the main threats are extremely effective social media lures, evasive ...

    http://www.scmp.com/article/1000358/cyber-thieves-get-clever
  3. Cyber-extortionists target HK businesses

    Posted Apr 10th 2011, 12:00am

    ... Nathan Griffiths Online attacks aimed at crippling websites unless cash is paid are on the rise and authorities can do little to stop them, leaving businesses to fend for themselves. Internet watchers say the attacks are becoming more complex, making the ...

    http://www.scmp.com/article/964616/cyber-extortionists-target-hk-businesses
  4. Cyber extortionists target businesses

    Posted Apr 10th 2011, 12:00am

    ... Nathan Griffiths Online attacks aimed at crippling websites unless cash is paid are on the rise and authorities can do little to stop them, leaving businesses to fend for themselves. Internet watchers say the attacks are becoming more complex, making the ...

    http://www.scmp.com/article/964689/cyber-extortionists-target-businesses
  5. New class of cyber criminals makes Net more dangerous

    Posted Sep 30th 2008, 12:00am by Jason Krupp

    ... profit. According to a recent report titled The Cyber Arms Race, the rich easy-to-pluck fruits of the internet have attracted the attention of criminal groups that run vast networks of compromised computers for profit. 'Today, the cyber-crime ecosystem is close to maturity - well defined relationships and business models are already in place. A new class of cyber criminal freely ...

    http://www.scmp.com/article/654461/new-class-cyber-criminals-makes-net-more-dangerous
  6. Cyber rogues the target of major corporations

    Posted Apr 12th 2005, 12:00am by Danyll Wills

    ... Reports by Danyll Wills Top executives voice fears about sophisticated threats to networks and compare the latest weapons to quell them SECURITY SYSTEMS armed with multiple layers of defence are required to tackle the increasingly sophisticated threats to ...

    http://www.scmp.com/article/496211/cyber-rogues-target-major-corporations
  7. Inventive criminals catch us out on web

    Posted Apr 18th 2012, 12:00am

    ... sophisticated cyber crime- once largely unknown- has become a major concern in the past decade. Cyber crime is an illegal action or activity that is committed over the internet. The net itself can ... social networking websites like everyone else- making friends and maintaining friendships. But their ultimate goal is to lure victims into a trap of physical assault or fraud. Cyber crime can ...

    http://www.scmp.com/article/998545/inventive-criminals-catch-us-out-web
  8. Firm aided HKEx after web breach

    Posted Aug 29th 2011, 12:00am

    ... Bien Perez bien.perez@scmp.com Weeks after cyber attackers crashed the Hong Kong stock exchange's regulatory disclosure website, a United States-based information technology company ... technology that allowed the website to continue running while being shielded from further attacks. During a three-day stretch from August 10, a wave of cyber attacks derailed operations ...

    http://www.scmp.com/article/977500/firm-aided-hkex-after-web-breach
  9. Invisible intruders

    Posted Nov 21st 2011, 12:00am

    ... between victim and attacker, and gives cyber criminals the advantage of anonymity. They cleverly lure you into compromising situations. Their methods vary, but by the time you're aware of an attack, it's often too late. Vigilance is one of the best ways to combat cyber attacks. Be aware of scams and other strategies. Knowing the different types of threat will make you a more ...

    http://www.scmp.com/article/985441/invisible-intruders
  10. Security systems take on hackers

    Posted Jun 07th 2010, 12:00am by Staff Reporter

    ... charted the growth of malicious cyber activity. Ploys enticing computer users to click on links ranged from e-mail attachments, or adverts claiming to clean up viruses, to phishing links for fake ... wheeling out the big guns of cyber security. UTM is set to be a big growth area for the hi-tech sector by next year and has already outgrown the firewall market, according to Fortinet, which ...

    http://www.scmp.com/article/716476/security-systems-take-hackers

Pages

Login

SCMP.com Account

or