DataCenterNews Asia Pacific - Specialist news for cloud & data center decision-makers

Aria stories - Page 90

Aria is where cutting‑edge technology, security, and AI‑driven innovation intersect. The stories tagged here span everything from next‑gen cloud and data platforms to ransomware trends, smart infrastructure, and the fast‑evolving world of generative and agentic AI. If you want to understand how tools like AI copilots, LLMs, and real‑time analytics are reshaping everything from finance to healthcare to manufacturing, this is your starting point.

Dive into in‑depth coverage of cybersecurity – botnets, ransomware variants, mobile malware, zero‑day exploits, and the shift to continuous, intelligence‑led defence. Explore how data centres, networks, and observability platforms are being redesigned for AI workloads, sustainability, and hybrid cloud. Follow the rise of AI in everyday products too, from wearables and smart home devices to vehicles, retail experiences, and next‑gen collaboration tools.

Aria isn’t just about the technology itself, but about its impact: on regulation, trust, jobs, skills, and digital resilience. Here you’ll find expert commentary, major vendor announcements, case studies, and long‑form explainers that help you connect the dots between infrastructure, security, AI, and real business outcomes. If you’re responsible for strategy, architecture, risk, or innovation, the Aria tag will keep you ahead of what’s coming next.

Galaxynote7 feature iris main final 1

Hackers run circles around Samsung's iris scanner security

Wed, 24th May 2017
#
biometrics
#
payment technologies
#
cybersecurity
Chaos at Samsung: Hackers bypass S8 iris scan with picture and contact lens, exposing security flaws in high-tech system.
Thinkstockphotos 684061756

Digital Shadows on Wannacry: An analysis of competing hypotheses

Mon, 22nd May 2017
#
malware
#
ransomware
#
cybersecurity
Digital Shadows probes the enigma of WannaCry's origins, weighing cybercriminal mischief against nation-state subterfuge.
Iot2

Avoiding pitfalls in IoT integration - Gartner

Mon, 22nd May 2017
#
iot
#
api
#
opinion
Benoit Lheureux outlines five steps for integration leaders to address some of the most common challenges in IoT integration.
1671 rich green

Mid-market CRM software Sugar announces update to version 7.9

Thu, 18th May 2017
#
crm
#
martech
#
software updates
SugarCRM unveils Sugar 7.9, boosting CRM functionality with enhanced quote management, next-gen reporting, and advanced workflows.
Thinkstockphotos 682769984

A look at the evolution of the Nemucod malware

Thu, 18th May 2017
#
malware
#
firewalls
#
network infrastructure
Unit 42 researchers have uncovered details about how the slippery Nemucod malware has been able to avoid detection.
Peter bender veeam

Veeam debuts 'partner-centric' offerings, upgrades – and new partner program

Wed, 17th May 2017
#
virtualisation
#
data analytics
#
martech
Veeam has unveiled a range of offerings it says are designed to drive partner revenue growth and leverage opportunities as customers go multi-cloud.
Thinkstockphotos 599477738

How to protect your organisation from WannaCry ransomware

Mon, 15th May 2017
#
malware
#
ransomware
#
ai security
Defend against the global WannaCry threat with robust cybersecurity measures and constant vigilance, says Carbon Black's team.
Thinkstockphotos 671507232

In-depth: Security experts explain the WannaCry ransomware's world domination

Mon, 15th May 2017
#
malware
#
ransomware
#
casb
Does it make you WannaCry? Experts from around the world comment on the ransomware's deadly attacks over the weekend, & if there's a way to stop it.
Thinkstockphotos 587802732

The rise of ransomware in Southeast Asia

Fri, 12th May 2017
#
malware
#
ddos
#
ransomware
It is likely that cybercriminals will target on internet of things (IOT) devices in technologically, advanced economies throughout Southeast Asia.
Thinkstockphotos 612237188 1

What we can learn from the Google Docs hack

Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don't be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Thinkstockphotos 638053528

What makes Locky and Cerber ransomware so good - and what about CradleCore?

Wed, 10th May 2017
#
malware
#
ransomware
#
cybersecurity
Trend Micro details the evolution of Locky and Cerber, ransomware outsmarting defences, as CradleCore's source code sale potentially marks a worrying shift.
Thinkstockphotos 124817878

What makes the Cerber ransomware so agile?

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
The Cerber ransomware has been one of the most nimble, varied and dominant malware strains on the market — almost neck-and-neck with Locky.
Thinkstockphotos 636590596

Bitdefender creates decryption tool for Bart ransomware victims

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
Help is at hand for victims of the Bart ransomware, after Bitdefender released a decryption tool that works for all variants.
Thinkstockphotos 676380064

No favourites here: What makes up the art of cybersecurity warfare

Mon, 8th May 2017
#
malware
#
ddos
#
ransomware
90% of major Australian businesses and government agencies have been targeted by cyber attacks in the past year.
Thinkstockphotos 101359429

Kazuar trojan hijacks Microsoft .NET framework to conduct espionage attacks

Mon, 8th May 2017
#
firewalls
#
network infrastructure
#
network security
Researchers have uncovered the 'Kazuar' backdoor trojan, which has been detected in espionage campaigns across the globe, Unit 42 reports.
Thinkstockphotos 200484500 001

WatchGuard report: 30% of all malware isn't caught by legacy AV

Mon, 8th May 2017
#
malware
#
firewalls
#
network infrastructure
WatchGuard's Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.
Thinkstockphotos 87357192

Global warning as spam attacks target stock market manipulation

Thu, 4th May 2017
#
spam
#
stock market
#
retarus
Sophisticated spam blitz threatens markets as Retarus flags a botnet's discreet bid to skew a Latvian stock's value.
Darth 1

May the 4th be with you: Star Wars tech that actually exists

Thu, 4th May 2017
#
cloud services
#
3d printing
#
star wars
From holograms to bionic limbs, this Star Wars day unveils real-life tech feats inspired by the saga's futuristic vision.
Thinkstockphotos 133532582

Adiabatic and evaporative cooling techniques deliver big data center savings

Tue, 2nd May 2017
#
datacentre infrastructure
#
power / energy
#
schneider electric
In particular, the adiabatic system reduces the energy impact both in summer and in mid-season more, operating for the large part of the year.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.