The integrity of Malaysian commercial and government computer systems continues to be threatened by the increase of...
Forensic Data & Cyber Threats Articles
Ransomware attacks surge in Malaysia
Ransomware has become a critical threat for small and medium sized businesses in Malaysia and across South East Asia...
Mobile Phone Thefts
Ever since mobile phones became an essential tool for businesspeople, their theft and resale has posed a security...
Mobile phone hacking scandal rumbles on
It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper]...
Vodafone Australia hit by Privacy Breach
VODAFONE Australia launched an internal investigation into a security breach that has put invoicing and call records...
When does unauthorised access to email become hacking?
In late December 2010 in the US state of Michigan, a man has been charged by Police under anti-hacking laws intended...
Desperately seeking FaceBook
nude photos poster
The teenage girl reportedly behind the posting of naked photos of St Kilda AFL football player Nick Riewoldt on her...
Discarding computer hard drives can be dangerous
During a computer upgrade or computer replacement, many are tempted to toss the old hard drive on the curbside, sell...
Police use FaceBook to serve intervention order
on people they can’t find
Australian Police have taken the unusual step of serving an intervention order via social networking site FaceBook....
More employees terminated for FaceBook postings
The divide between work place responsibilities and private time has become further blurred as employees’ FaceBook and...
NSW MPs or staffers viewing porn
on parliament computers
Police may be instructed to investigate reports New South Wales Members of Parliament or their staffers over...
Police Department background checks
delve into Facebook History
Just how far should background screening delve into the private lives of candidates? If you want to be a Police...