CFOtech Asia - Technology news for CFOs & financial decision-makers

Aria stories - Page 83

Aria is where cutting‑edge technology, security, and AI‑driven innovation intersect. The stories tagged here span everything from next‑gen cloud and data platforms to ransomware trends, smart infrastructure, and the fast‑evolving world of generative and agentic AI. If you want to understand how tools like AI copilots, LLMs, and real‑time analytics are reshaping everything from finance to healthcare to manufacturing, this is your starting point.

Dive into in‑depth coverage of cybersecurity – botnets, ransomware variants, mobile malware, zero‑day exploits, and the shift to continuous, intelligence‑led defence. Explore how data centres, networks, and observability platforms are being redesigned for AI workloads, sustainability, and hybrid cloud. Follow the rise of AI in everyday products too, from wearables and smart home devices to vehicles, retail experiences, and next‑gen collaboration tools.

Aria isn’t just about the technology itself, but about its impact: on regulation, trust, jobs, skills, and digital resilience. Here you’ll find expert commentary, major vendor announcements, case studies, and long‑form explainers that help you connect the dots between infrastructure, security, AI, and real business outcomes. If you’re responsible for strategy, architecture, risk, or innovation, the Aria tag will keep you ahead of what’s coming next.

Thinkstockphotos 501748178

US$250,000 up for grabs with Microsoft's bug bounty

Mon, 19th Mar 2018
#
cybersecurity
#
microsoft
#
microsoft azure
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Kablamo

Bitcoin's not a fad, it's a waiting game

Fri, 16th Mar 2018
#
crypto
#
blockchain
#
defi
The Bitcoin's wild price swings have polarised people into evangelists and detractors - but why does the technology matter?.
Cyber security

Intel aims to battle cyber security risks at a silicon level

Fri, 16th Mar 2018
#
cybersecurity
#
intel
#
spectre
In addressing the vulnerabilities reported by Google Project Zero, Intel and the technology industry have faced significant challenges.
Screen shot 2018 03 14 at 11

New study details how easy it is for hackers to steal your data

Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Thinkstockphotos 921367990

IoT attacks, ransomware, and steganography? Fortinet looks at the latest cybercrime trends

Mon, 12th Mar 2018
#
malware
#
firewalls
#
network infrastructure
Fortinet says that stenography as an attack vector hasn't had too much visibility in the last several years but it could be the start of a resurgence.
Wall thing

Haier to launch all-scenario smart home solution

Mon, 12th Mar 2018
#
iot
#
smart home
#
ai
Haier unveils an all-scenario smart home solution integrating living spaces and essential systems, customisable through its pioneering 4+7+N concept.
Screen shot 2018 03 06 at 4

FEATURE: Tech's female powerhouses tackle women shortage issue

Thu, 8th Mar 2018
#
it automation
#
skillsoft
#
it careers
International Women's Day is here and what better time to tackle the elephant in the room that is the huge gender disparity in the technology sector.
Screen shot 2018 03 07 at 3

Blueliv makes plea for cybercrime intelligence sharing across industries

Thu, 8th Mar 2018
#
malware
#
uc
#
data privacy
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.
Screen shot 2018 03 06 at 12

REPORT: Ransomware decreasing in quantity but increasing in potency

Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Thinkstockphotos 482074740

Researchers probe psychology behind phishing attacks

Wed, 28th Feb 2018
#
edutech
#
phishing
#
email security
What makes the difference between a successful phishing attack and an unsuccessful one?ask researchers from Carnegie Mellon University.
Starix

Intel ships industry's first 58G PAM4-capable FPGA for network infrastructure

Tue, 27th Feb 2018
#
intel
#
fpga
#
emib
Intel announced that it has begun shipping its Intel Stratix 10 TX FPGAs, the industry's only field programmable gate array.
Screen shot 2018 02 21 at 11

Check Point releases January's 'most wanted' malware

Wed, 21st Feb 2018
#
malware
#
crypto
#
blockchain
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Gita

Ex-Cyclone Gita may have blown away your internet

Wed, 21st Feb 2018
#
chorus
#
fibre
#
cyclone computers
Ex-Cyclone Gita disrupts internet for about 1,000 Kiwi households, mostly due to power outages. Chorus works to restore services but access issues persist.
Thinkstockphotos 879913100

State-sponsored North Korean cyberespionage group continues to weaponize tactics

Wed, 21st Feb 2018
#
breach prevention
#
healthtech
#
fireeye
The North Korean threat group known to some as Reaper (APT37) is eyeing bigger targets with more sophisticated tactics.
Thinkstockphotos 641517852

United States hot on heels of North Korea's Hidden Cobra malware

Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government's activities known as HIDDEN COBRA.
Thinkstockphotos 880737456

New email spam campaign ditches traditional Office macro infection tactic

Mon, 19th Feb 2018
#
malware
#
email security
#
cybersecurity
A new wave of spam emails use Microsoft Office documents to download password stealers without having to activate Macros.
Thinkstockphotos 646884988

Rumours fly about who was behind the PyeongChang Olympics hack

Fri, 16th Feb 2018
#
hacking
#
talos
#
winter olympics
The Olympic Destroyer campaign comes at a precarious time of geopolitical tensions with several possible perpetrators but no conclusive proof.
Screen shot 2018 02 16 at 2

Data fabric company making waves with global awards

Fri, 16th Feb 2018
#
storage
#
data fabric
#
iofabric
Five-year-old storage company ioFABRIC has been awarded two Tech Trailblazers Awards for their data fabric offerings and CTO.
Thinkstockphotos 517158992

Gartner provides 7 steps for dealing with Spectre and Meltdown

Fri, 16th Feb 2018
#
iaas
#
risk & compliance
#
cybersecurity
​No doubt you've heard of Spectre and Meltdown before, given security researchers are calling them 'catastrophic' - here's Gartner's advice.
Thinkstockphotos 483510067

Google Cloud TPU machine learning accelerators now available in beta

Tue, 13th Feb 2018
#
hyperscale
#
public cloud
#
open source
Google's beta Cloud TPUs accelerate ML on GCP, slashing training times and costs, with full TPU pods coming soon.