Learn to recognise and identify scams, so you don’t get cheated The Macau scam is fairly well known today -...
Forensic Data & Cyber Threats Articles
Business Email Compromise Scams Are On The Rise
Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email...
Issues with Listening Devices – aka `bugs’
Listening Devices – aka `bugs’Technical Surveillance is the security industry term for that laypeople would normally...
Spear Phishing Attacks in Malaysia
The integrity of Malaysian commercial and government computer systems continues to be threatened by the increase of...
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia...
Mobile Phone Thefts
Ever since mobile phones became an essential tool for businesspeople, their theft and resale has posed a security...
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to...
Theft of military data drive
exposes security flaws
Top secret defence documents belonging to the commander of Australian operations in the Middle East stored on a USB...
‘Flash robs’ create new challenge to retailers
Just as Twitter, face book and other social networking sites have allowed dissidents to plot the overthrow of...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units...
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a...