Skip to content
+62 21 4250 088 | +62 21 224 21 455info@infosystem.co.id
Wiyarta Infosystem Nusantara
  • Home
  • About Us
    • Profile
    • Work
    • Care
    • Serve
  • Services
    • Operating System Planning and Migration
    • System Planning and Implementation
    • IT Assets Management and Assesment
    • Network Security and Audit
    • Network Monitoring
    • Network Design and Deployment
  • Product
    • Enterprise resource planning (ERP)
    • Digital Signage
    • Attendance System
    • Integrated Network Communication
    • IP Based Surveillance System
    • Special Purpose POS
    • Storage Management System
  • Blog
  • Contact

Category: Uncategorized

  • Home
  • Uncategorized
  • Page 8
25 Jan 2019

Ongoing Campaign Delivers Redaman Banking Trojan

webmasterUncategorized

Spam campaigns that have active during the last several months have been distributing the Redaman banking malware, Palo Alto Networks security researchers say. read more Source: Ongoing Campaign Delivers Redaman Banking Trojan

Read More
25 Jan 2019

#DeleteFacebook? #DeleteTwitter? #FatLotOfGood that will do you

webmasterUncategorized

Your likes, interest and personality can be gleaned from as few as 8-9 friends on social media, whether you’re on the platform or not. Source: #DeleteFacebook? #DeleteTwitter? #FatLotOfGood that will do you

Read More
25 Jan 2019

Collateral Damage: When Cyberwarfare Targets Civilian Data

webmasterUncategorized

You can call it collateral damage. You can call it trickledown cyberwarfare. Either way, foreign hacker armies are targeting civilian enterprises – as a means of attacking rival government targets. Source: Collateral Damage: When Cyberwarfare Targets Civilian Data

Read More
21 Dec 2018

Hackers find a way to bypass Gmail two-factor authentication

webmasterUncategorized

Two-factor authentification has been hailed as a significant move forward in providing online security, letting us log in with confidence to sites such as Gmail. Websites that once required an insecure password now need a complex password with a second form of authentication from a mobile device, or implement other two-factor systems. Source: Hackers find…

Read More

Posts navigation

Newer posts

Serach

Recent Posts

  • The Agile Advantage of Container Orchestration Over Plain Virtualization
  • Considerations for Migrating Office Computing Operations to Open Source
  • Understanding Mail Flow Among MailServers
  • Understanding Mail Flow: From Sender to Receiver Inbox
  • Understanding Nextcloud: Benefits Over Traditional NAS and File Sharing Services

Recent Comments

    Archives

    • December 2024
    • June 2021
    • May 2020
    • April 2019
    • January 2019
    • December 2018
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017

    Categories

    • News
    • Uncategorized

    We are on X

    Menu

    • Home
    • About Us
      • Who We Are
    • Services
    • Product
    • Blog
    • Links
      • Presentations
      • Video
      • Short Video
    • Contact

    Categories

    • News
    • Uncategorized

    Recent Posts

    • The Agile Advantage of Container Orchestration Over Plain Virtualization
    • Considerations for Migrating Office Computing Operations to Open Source
    • Understanding Mail Flow Among MailServers
    • Understanding Mail Flow: From Sender to Receiver Inbox

    Office Address


    PT. Wiyarta Infosystem Nusantara

    +62 21 4250 777,
    +62 21 4250 088,
    +62 21 400 11 777

    info@infosystem.co.id
    www.infosystem.co.id
    Grha Wiyarta, Jl. Cempaka Putih Tengah 1 No.5D, Cempaka Putih, Jakarta Pusat

    08:00-20:00 Monday-Friday

    infosystem © all right reserved 2016

    PT. Wiyarta Infosystem Nusantara