Regents Risk Advisory
  • Home
  • About Us
  • Investigation & Fact-Finding
    • Corporate Investigations
    • Internal Theft
    • Intellectual Property
    • Litigation Assistance
    • Employee Misconduct
    • Locating People
  • Intelligence & Background
    • Pre-Employment Screening
    • Business Intelligence
    • Asset Tracing
    • Vendor Integrity Audit
    • Due Diligence
  • Forensic Data & Cyber Threats
    • Computer Forensics
    • Mobile Phone Forensics
    • Cyber Threats
    • TSCM
    • Document Examination
  • Fraud & Integrity
    • Corporate Fraud Investigations
    • Fraud Audit
    • Whistleblowing
    • Corruption
    • Crisis Management
  • Contact Us
  • Regents Blog
Select Page
Digital photocopiers pose security threat  for identity theft

Digital photocopiers pose security threat
for identity theft

by Regents Risk Advisory | Apr 22, 2012 | Computer Forensics, Cyber-Threat

The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to your personal or sensitive data. Though most users are unaware, nearly all digital copiers sold since 2002 contain a digital hard drive — similar to...
Hacking of White House Gmail accounts

Hacking of White House Gmail accounts

by Regents Risk Advisory | Jun 6, 2011 | Cyber-Threat, Data Security, Forensic Data & Cyber Threats

The recent announcement by Google that a number of users Gmail accounts have been hacked into has ratchet up the debate on cyber war between China and the US. The importance of this report relates to the fact that these Gmail accounts were held and sued by senior US...
Securing smartphones data

Securing smartphones data

by Regents Risk Advisory | Apr 17, 2011 | Cyber-Threat, Data Security, Forensic Data & Cyber Threats

Recent sales figures indicating that worldwide sales for smartphones will increase by 60% and top half a billion units in 2011 confirms what most people already knew; smartphones are no longer just for top executives or city hopping businesspeople. Smartphones –...
Gift card vouchers and the link to money laundering

Gift card vouchers and the link
to money laundering

by Regents Risk Advisory | Mar 19, 2011 | Fraud & Integrity, Fraud Money Laundering

Gift card vouchers can be the perfect solution for a birthday when you’re not sure which present to buy. Simply pay cash at the store or shopping mall and transfer the same value onto the voucher to be used at the designated outlets. Travellers Cheques have been...
Mobile phone hacking scandal rumbles on

Mobile phone hacking scandal rumbles on

by Regents Risk Advisory | Feb 19, 2011 | Computer Forensics, Cyber-Threat, Forensic Data & Cyber Threats, Stalking

It is four years since the phone-hacking scandal at the News of the World newspaper [the leading UK Sunday newspaper] saw the newspaper’s former royal correspondent, Clive Goodman, jailed for his part in hacking into the mobile phone voicemails of Princes William...
« Older Entries

Categories

  • Bullying (2)
  • Forensic Data & Cyber Threats (26)
    • Computer Forensics (6)
    • Cyber-Threat (21)
    • Data Security (14)
  • Fraud & Integrity (19)
    • Corporate Fraud Investigations (4)
    • Corruption (9)
    • Fraud Audit (2)
    • Whistleblower (1)
  • Fraud Money Laundering (7)
  • Investigation & Background (9)
    • Asset Tracing (1)
    • Business Intelligence (2)
    • Due Diligence (3)
    • Pre-Employment Screening (5)
    • Vendor Integrity (1)
  • Investigation & Fact Finding (19)
    • Corporate Investigations (1)
    • Employee Misconduct (7)
    • Intellectual Property (8)
    • Locating People (3)
  • Miscellaneous (12)
  • Stalking (3)

Recent Posts

  • Romance scams and crypto scams
  • Eight Pointers to Stay Safe While Shopping Online
  • Seven Red Flags That May Indicate Fraud is Occurring Within Your Company
  • Asset Recovery Process in Malaysia & Singapore
  • Procurement Fraud threats to companies

Popular Topics

acfe Air India anti money laundering background checks bribery Code of Conduct computer forensics corruption counterfeit counterfeit phone data protection facebook fake artwork fake iphone fake resume fraud fraud audit fraud investigation Fraud Prevention Program hacking Hotlines identity theft ikea intellectual property investigation Kenneth Lonchar maladministration money laundering ponzi ponzi scheme Pre-Employment Screening red flags regents risk advisory resume padding Richard Li Tzar Kai Ronald Zarrella scam Scott Thompson singapore Ikea stalker stalking Stelios Haji-Ioannou Tee Fook Boon Yahoo CEO Yahoo CEO Scott Thompson

To find out more about our risk and investigation services, or to make an enquiry on a confidential basis, send an email to support@regentsriskadvisory.com

Offices

Malaysia

B-5-8 Plaza Mont Kiara,
Mont Kiara,
Kuala Lumpur  50480 Malaysia
Tel +603 6204 5785
Fax +603 6204 5765

Malaysia

B-5-8 Plaza Mont Kiara, 
Mont Kiara,
Kuala Lumpur  50480 Malaysia
Tel +603 6204 5785
Fax +603 6204 5765

Singapore

50 East Coast Road, Roxy Square
Singapore 428769
Tel +65 6345 5770
Fax +65 6345 6713

Singapore

50 East Coast Road, Roxy Square
Singapore 428769
Tel +65 6345 5770
Fax +65 6345 6713

Join Our Newsletter

Success!

Subscribe

  • Forensic Data & Cyber Threats
  • Fraud & Integrity
  • Intelligence & Background
  • Investigation & Fact-Finding
Privacy Policy           Sitemap