FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “attacking”

Showing 1 - 7 of 7

Image-Content

TECH

Attackers placing greater stress on exploiting data centres

Business, Suchit Leesa-nguansuk, Published on 21/04/2023

» Attackers have shifted their focus from exploiting individual devices to enterprise data centres, warns cybersecurity firm Palo Alto Networks.

BUSINESS

Malware snoops in Thai systems

Business, Suchit Leesa-nguansuk, Published on 28/04/2018

» Thailand is one of 17 countries snared by Operation GhostSecret, a global data reconnaissance campaign attacking critical infrastructure.

Image-Content

BUSINESS

Fortinet warns of cybercrooks exploiting AI

Business, Suchit Leesa-nguansuk, Published on 21/12/2017

» The rise of artificial intelligence (AI) technology lets cybercriminals develop next generation attacks such as machine-generated malware, ransomware and "cybercrime as a service", says a security strategist.

Image-Content

BUSINESS

Bitcoin, mobile payments battle against cyberthreats

Business, Suchit Leesa-nguansuk, Published on 15/12/2017

» Bitcoin and exchanges, artificial intelligence (AI) and the Internet of Things (IoT) are among the top cybersecurity attack trends in 2018, with mobile payments a primary target in Thailand, says a leading global technology firm.

BUSINESS

Cybertron taps weak cybersecurity

Business, Suchit Leesa-nguansuk, Published on 14/10/2015

» Local cybersecurity training company ACIS Professional Center has teamed up with e-services provider General Electronic Commerce Services (GECS) to provide cybersecurity services to organisation websites.

BUSINESS

Lenovo widens its global reach

Business, Suchit Leesa-nguansuk, Published on 16/01/2012

» LAS VEGAS, NEVADA : China-based Lenovo Group is upbeat about becoming the global market leader in consumer electronics by 2017, fuelled by mobile internet devices.

TECH

Social sites, cloud computing pose new threats

Database, Suchit Leesa-nguansuk, Published on 27/01/2010

» The increasing popularity of social networking and new technology development in cloud and virtualisation environment as well as new operating systems create loopholes for security threats in 2010.