Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email...
Cyber-Threat Articles
Spear Phishing Attacks in Malaysia
The integrity of Malaysian commercial and government computer systems continues to be threatened by the increase of...
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia...
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to...
Theft of military data drive
exposes security flaws
Top secret defence documents belonging to the commander of Australian operations in the Middle East stored on a USB...
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units...
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper]...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records...
When does unauthorised access to email become hacking?
In late December 2010 in the US state of Michigan, a man has been charged by Police under anti-hacking laws intended...