Mobile Security

Mobile Security: Connect your brain, not only your device!

Mobile devices often create opportunities. We are now able to access the web from the bus, buy stock options at the hairdresser, check emails...
crest

WLX is now CREST accredited Penetration Testing Provider GLOBALLY!

Based on the great success of wizlynx group in the Asia Pacific region providing CREST accredited penetration testing services, we decided to extend our...
CIAG

ISACA 2018 Cybersecurity, IT Assurance & Governance Conference

wizlynx group will be exhibiting at the ISACA 2018 Cybersecurity, IT Assurance & Governance Conference that will take place at the Sheraton Hotel Petaling...
Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...

Orca Security and wizlynx group announce Global Reselling and Service Provision...

Orca Security and wizlynx group are delighted to announce a global reselling and service provision partnership based...
Banking Trojan Illustration

Banking Trojans – An Immortal Enemy

A few years ago, the best way for a criminal to prepare for retirement was to rob a bank by physically breaking in or...

RSA Asia Conference 2018

wizlynx group will be exhibiting at the RSA Asia Conference that will take place at the Marina Bay Sands in Singapore from the 25th to...
Turning Point

Turning Point – Is Your Company Safe?

In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...
IoT Fridge illustration

Can a Refrigerator Compromise the Security of Your Company?

The internet has been invented for a while now. It connected people, images, recording, games, books, and commerce. By people, for people. With the...
Hacker illustrationvideo

Ethical Hacking & Penetration Testing Services

Leave No Stone Unturned! IT Security is not a feature but a state of mind. It is our vocation. By adopting latest hacking methods and...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts