Forensic Data & Cyber Threats Articles

Home | Our Articles

Learn to recognise and identify scams, so you don’t get cheated

Learn to recognise and identify scams, so you don’t get cheated   The Macau scam is fairly well known today - unwitting victims receives a phone call from an individual impersonating as an official of a significant establishment or organisation and is told that...

Business Email Compromise Scams Are On The Rise

Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email account compromise scams (EAC) in recent years, causing losses of Millions of Dollars every year to individuals,...

Issues with Listening Devices – aka `bugs’

Listening Devices – aka `bugs’Technical Surveillance is the security industry term for that laypeople would normally call a `bug’ – essentially a listening device that can be placed inside an office, vehicle, room etc. The Technical Surveillance device can then record...

Spear Phishing Attacks in Malaysia

The integrity of Malaysian commercial and government computer systems continues to be threatened by the increase of spear phishing attacks by groups based overseas. Phishing attacks occur where mass emails are sent out to multiple users enticing them to click on a...