Tuesday Mar 19th

Messengers and social media can serve to disclose personal data
I was watching The Social Dilemma on Netflix earlier this month and highly recommend it. The quintessence of the film is that today’s technology that connects us also monetizes us - or even controls us – with frightening consequences.  Although we are aware of that already – a ...
Read more...
Sentryc stops product piracy on the internet
Every year, brand abuse and product piracy result in losses of billions in e-commerce. The start-up Sentryc wants to change this by using AI to scan the Internet and remove plagiarism almost automatically.The young technology company, founded in 2019 and headquartered in Berlin, offers companies a u ...
Read more...
Not all data is created equal
In marketing, data is divided into first, second, and third-party data, based on their origin. Third party data, which currently still is the basis for dominant forms of advertising, such as programmatic advertising and thus for a large part of personalization in marketing, in particular in the form ...
Read more...
Fileless malware continues to grow
The effective and timely identification of malware is one of the greatest challenges for IT security today. This is not least due to the sheer number of new malware variants but also to their sophisticated obfuscation, which overwhelms conventional signature-based protection technologies.Mainly file ...
Read more...
What needs to be considered in terms of data protection when cooperating with freelancers
Hiring freelancers has many advantages for companies: they do not have to pay social security contributions for them, they can be used flexibly, are often specialized in a certain subject area and can be implemented for projects that arise at short notice.
Read more...
Competitive advantage of cybersecurity often still undervalued
In times of increasing digitization and a steadily growing threat from cyberattacks, stable IT security is an important prerequisite for a functioning and growing business. Unfortunately, studies show that this insight has not yet reached all managing directors and board members, instead their conce ...
Read more...
Growing security risks to drive APAC managed security services revenue to US$17bn in 2024
Growing security risks and incidents of ransomware have been forcing enterprises across the Asia-Pacific (APAC) region to search for trusted and competent security services providers. Against this backdrop, managed security services (MSS) revenue in the region is estimated to reach US$17bn in 2024, ...
Read more...
Apple operating system increasingly the target of malware
MacOS has the reputation of being a relatively attack-proof operating system. Not only among Apple users, MacOS has always been far less susceptible to malware and cyberattacks than the market leader Windows. The fact is, however, that even Mac users are not immune to compromises or dangerous infect ...
Read more...
The importance of E-A-T in content creation
Google's goal is to provide searchers with high-quality answers to every question they could possibly ask. To do this, it relies on a complex collection of rules and ranking factors. Some of these factors fall under the category of E-A-T, meaning Expertise, Authoritativeness and Trustworthiness.
Read more...
ConnecTechAsia announces headliners and themes for virtual conference
Featuring over 220 speakers and more than 200 sessions, the ConnecTechAsia conference will cover all the latest trends within the Telecom, Media and Technology (TMT) space: Anne Chow, CEO, AT&T Business; Huey Tyng Ooi, Managing Director, Head of GrabPay, Grab; Brenda Harvey, General Manager, IBM ...
Read more...
List of Asian countries most at risk of RDP brute-force attacks
The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been reliant on remote desktop connections to enable their employees to access their work computer from home.One of the most popular applications for accessing Windows wor ...
Read more...
10 golden rules for a safe home office
Many employees are currently still working from home which entails a lot of new IT security risks, since hackers are increasingly taking advantage of the current uncertainty.
Read more...
Malaysia successfully fighting streaming piracy
A new study, researching content viewing behavior of Malaysian consumers, has found a massive 64% decrease in consumers accessing piracy websites over the past 12 months, due to the Ministry of Domestic Trade and Consumer Affairs’ (MDTCA) site blocking efforts.The survey, commissioned by AVIA' ...
Read more...
ioGates ultra secure content sharing service adds desktop app and smart link sharing
ioGates, a developer of ultra-secure file-sharing services for media professionals, has expanded its content sharing service to include new “Smart Link” automation and metadata management capabilities. Enhancements let users define multiple sharing rules in a single ioGates “Smart ...
Read more...
Novel Linux malware targets VoIP softswitches
ESET researchers have discovered a previously unknown Linux malware that targets Voice over IP (VoIP) soft switches. The malicious program was named by the analysts of the European IT security manufacturer CDRThief. It is designed to target a very specific VoIP platform, used by two China-produced s ...
Read more...
Privileged accounts remain a popular gateway for hackers
Privileged accounts, such as local admin and service accounts, exist everywhere in multiple places throughout an organization, and trying to manually discover and manage them is virtually impossible. That’s why Thycotic recommends automating privileged account discovery on a continuous basis s ...
Read more...
Manipulated language AI can write manifestos that appear human and radicalize automatically
Shockingly, researchers at the Middlebury Institute of International Studies at Monterey, California, managed to teach Artificial Intelligence (AI) "GPT-3" to believe in the "QAnon" conspiracy theories that are widely spread on the Internet.Generative Pre-trained Transformer 3 (GPT-3) is an autoregr ...
Read more...
Thycotic deploys advanced machine learning to control dangerous applications on endpoints
Thycotic, a provider of cloud-ready Privileged Access Management (PAM) solutions for more than 10,000 organizations worldwide released Privilege Manager 10.8 which uses advanced machine learning capabilities to better assist IT teams in securing employee workstations and servers. The company makes e ...
Read more...

About Us

MediaBUZZ is the first ‘pure’ digital publisher in the region, making an impact in Asia Pacific since 2004. Designed to empower marketers in the vibrant, ever-changing electronic marketing environment, its publication Asian eMarketing covers the digital age and zooms in on the most valuable and indispensable tools of today’s marketers. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy, vital for their growing business success.

Contact Us

MediaBUZZ Pte Ltd

Reg. No. 200407301C

Phone: +65 6836 1807

Fax: +65 6235 1706

General Contact: info[at]mediabuzz.com.sg