Learn to recognise and identify scams, so you don’t get cheated The Macau scam is fairly well known today -...
Data Security Articles
Business Email Compromise Scams Are On The Rise
Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email...
Issues with Listening Devices – aka `bugs’
Listening Devices – aka `bugs’Technical Surveillance is the security industry term for that laypeople would normally...
Spear Phishing Attacks in Malaysia
The integrity of Malaysian commercial and government computer systems continues to be threatened by the increase of...
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia...
Mobile Phone Thefts
Ever since mobile phones became an essential tool for businesspeople, their theft and resale has posed a security...
Theft of military data drive
exposes security flaws
Top secret defence documents belonging to the commander of Australian operations in the Middle East stored on a USB...
Hacking of White House Gmail accounts
The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the...
Securing smartphones data
Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units...
Better password protection by `Naked Password’
Most people are lazy when it comes to using computers properly. People are even lazier when to comes to selecting a...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records...
When does unauthorised access to email become hacking?
In late December 2010 in the US state of Michigan, a man has been charged by Police under anti-hacking laws intended...