[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Almost every Android OS update includes new security features designed to make cybercriminals’ life harder. And, of course, the cybercriminals always try to bypass them. We have found a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added in Android 6: permission-based app overlays and a dynamic permission […]

What you should know about Windows 10
September 6, 2016

It is reaching the end of its first year and now companies are asking, is it the right moment to update to Windows 10?Now that it’s becoming somewhat mature, should businesses take the plunge and invest time and money to upgrade their software? The general opinion is that yes, companies should upgrade. After all, it […]

China continues to host the most powerful supercomputer in the world— with 93 petaflop/s (quadrillions of calculations per second), the Sunway TaihuLight displaces Tianhe-2, the other Chinese supercomputer that claimed the No. 1 spot on the past six TOP500 rankings. But there’s something else. This supercomputer monster is not only powerful but it is also […]

What separates Twitter commoners from Twitter royalty? A blue badge indicating who has a special account verified by Twitter. These users usually include the most searched and include celebrities and influencers. Only 187,000 of the 320 million monthly Twitter users are a part of this distinguished club. In addition to giving them a higher rank, […]

How Trojans manipulate Google Play
August 31, 2016

For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the trust of that audience and experiences a degree of leniency from the security systems built into operating systems. On mobile devices, users typically cannot install applications coming from sources other than […]

1 59 60 61 62 63 157