September 14, 2019

What is Browser Fingerprinting? How You Are Tracked Without an IP Address

Did you know that there is one way you can be tracked on the Internet without an IP address? That’s right, and it’s through browser fingerprinting. Browser fingerprinting is one of the most accurate ways of tracking a particular device on the Interne, and it’s practically impossible to fully evade. You could evade […]
September 8, 2019

How ICT Developments Affect Cybercrime in Malaysia

Who robs a bank anymore when you can just do it over a computer? The digitalisation of everything in our lives enables cybercrime to spread like wildfire. The cybercrime business is no longer what you imagine; operations carried out in dingy basements by a group of computer geeks. Cybercrime can now go from […]
August 31, 2019

5 Vital Pieces of Info Scammers Steal Online

Here’s a quick quiz: Which form of theft has the biggest cost for its victims? It’s identity theft! According to the US Department of Justice, online identity theft cost victims more than household burglary, motor theft, and property theft combined. This is probably unsurprising as we run most of our lives online and […]
August 17, 2019

What is a VPN Kill Switch? Does Your VPN Need It?

You have probably come across the term “VPN kill switch” while researching for a Virtual Private Network to subscribe. Alternatively, you might already nave a VPN but never knew such a feature existed. If you are wondering what a VPN kill switch is, it is an added feature which typically comes with any […]
August 12, 2019

Your Personal & Group WhatsApp Messages Can Be Altered by Hackers

During the annual Black Hat security conference that was held in Las Vegas, security researchers from Israeli cyber security firm Check Point Research demonstrated how vulnerabilities in WhatsApp’s platform could be used to manipulate the contents of messages sent in a personal and group chats. WhatsApp messages are typically encrypted by default so […]
July 27, 2019

How China Controls the Internet

While in many parts of the world the debate goes on in regards to the free-flow of information on the internet, in China there is no debate at all. It is well known that the China government maintains a tight control on what its citizens are allowed to see or access. In 2018, […]
July 13, 2019

6 Tell-Tale Signs of a Phishing Scam

Scam messages have common characteristics which we can use to weed them out. Sometimes it can be hard when the messages they give are so convincing. You find yourself thinking “Is this message safe to ignore? Or is there no harm to respond?” Hopefully by the end of this article, you will know […]
July 6, 2019

10 Riskiest Employee Habits

Humans often make the weakest link in data protection. While employees can be the greatest assets for a company, they may also be one of the biggest threats to business data protection. Employee negligence can put an organisation at risk, especially given that more than half of employees carry sensitive business data on […]