October 27, 2019

What is Tails OS? A Beginner’s Explanation

This is an introduction to the Tails OS; a purpose-built, security-focused operating system which you can use to protect your work. Common operating systems in use are typically Windows, Mac OS, or commercial smartphone systems like Android or iOS. With these operating systems, there are issues if you are doing work which requires […]
October 17, 2019

Digital Signatures & Digital Certificates: A Beginner’s Explanation

What are digital signatures and digital certificates? Digital signatures rely on asymmetric key cryptography. Before we go into digital signatures, let’s briefly go into how asymmetric key cryptography works.   ASYMMETRIC KEY CRYPTOGRAPHY With asymmetric key cryptography, there is a pair of mathematically related keys. If you encrypt a message with one of […]
October 5, 2019

The One Simple Method to Block Mobile Ads Tracking

These days, whatever you do on the Internet easily ends up building a profile of your likes, behaviour, and demographic. If you are not careful, these digital footprints of whatever you do online winds up being traced back to you and served to you in the form of targeted advertising. Online ads seem […]
September 22, 2019

How Companies Connect Your Online Browsing to Your Offline Purchases

You’ve heard how companies or online retailers track your surfing habits. Data analytics companies collect and analyse billions of consumers and shoppers on the internet. These companies then present this online behaviour data for their clients to enable them to understand their consumers’ demands, trends and competitors performance. Have you ever wondered though […]
September 14, 2019

What is Browser Fingerprinting? How You Are Tracked Without an IP Address

Did you know that there is one way you can be tracked on the Internet without an IP address? That’s right, and it’s through browser fingerprinting. Browser fingerprinting is one of the most accurate ways of tracking a particular device on the Interne, and it’s practically impossible to fully evade. You could evade […]
September 8, 2019

How ICT Developments Affect Cybercrime in Malaysia

Who robs a bank anymore when you can just do it over a computer? The digitalisation of everything in our lives enables cybercrime to spread like wildfire. The cybercrime business is no longer what you imagine; operations carried out in dingy basements by a group of computer geeks. Cybercrime can now go from […]
August 31, 2019

5 Vital Pieces of Info Scammers Steal Online

Here’s a quick quiz: Which form of theft has the biggest cost for its victims? It’s identity theft! According to the US Department of Justice, online identity theft cost victims more than household burglary, motor theft, and property theft combined. This is probably unsurprising as we run most of our lives online and […]
August 17, 2019

What is a VPN Kill Switch? Does Your VPN Need It?

You have probably come across the term “VPN kill switch” while researching for a Virtual Private Network to subscribe. Alternatively, you might already nave a VPN but never knew such a feature existed. If you are wondering what a VPN kill switch is, it is an added feature which typically comes with any […]