October 17, 2019

Digital Signatures & Digital Certificates: A Beginner’s Explanation

What are digital signatures and digital certificates? Digital signatures rely on asymmetric key cryptography. Before we go into digital signatures, let’s briefly go into how asymmetric key cryptography works.   ASYMMETRIC KEY CRYPTOGRAPHY With asymmetric key cryptography, there is a pair of mathematically related keys. If you encrypt a message with one of […]
October 5, 2019

The One Simple Method to Block Mobile Ads Tracking

These days, whatever you do on the Internet easily ends up building a profile of your likes, behaviour, and demographic. If you are not careful, these digital footprints of whatever you do online winds up being traced back to you and served to you in the form of targeted advertising. Online ads seem […]
September 22, 2019

How Companies Connect Your Online Browsing to Your Offline Purchases

You’ve heard how companies or online retailers track your surfing habits. Data analytics companies collect and analyse billions of consumers and shoppers on the internet. These companies then present this online behaviour data for their clients to enable them to understand their consumers’ demands, trends and competitors performance. Have you ever wondered though […]
September 14, 2019

What is Browser Fingerprinting? How You Are Tracked Without an IP Address

Did you know that there is one way you can be tracked on the Internet without an IP address? That’s right, and it’s through browser fingerprinting. Browser fingerprinting is one of the most accurate ways of tracking a particular device on the Interne, and it’s practically impossible to fully evade. You could evade […]
September 8, 2019

How ICT Developments Affect Cybercrime in Malaysia

Who robs a bank anymore when you can just do it over a computer? The digitalisation of everything in our lives enables cybercrime to spread like wildfire. The cybercrime business is no longer what you imagine; operations carried out in dingy basements by a group of computer geeks. Cybercrime can now go from […]
August 31, 2019

5 Vital Pieces of Info Scammers Steal Online

Here’s a quick quiz: Which form of theft has the biggest cost for its victims? It’s identity theft! According to the US Department of Justice, online identity theft cost victims more than household burglary, motor theft, and property theft combined. This is probably unsurprising as we run most of our lives online and […]
August 17, 2019

What is a VPN Kill Switch? Does Your VPN Need It?

You have probably come across the term “VPN kill switch” while researching for a Virtual Private Network to subscribe. Alternatively, you might already nave a VPN but never knew such a feature existed. If you are wondering what a VPN kill switch is, it is an added feature which typically comes with any […]
August 12, 2019

Your Personal & Group WhatsApp Messages Can Be Altered by Hackers

During the annual Black Hat security conference that was held in Las Vegas, security researchers from Israeli cyber security firm Check Point Research demonstrated how vulnerabilities in WhatsApp’s platform could be used to manipulate the contents of messages sent in a personal and group chats. WhatsApp messages are typically encrypted by default so […]