BLOG

What Is End-to-End Encryption?
This phrase has often appeared on the top of our Whatsapp conversation, whenever we open up a new chat. This seems to be a wonderment, as many would assume it would be an alert, as it is stated...
Hackers Exploit COVID-19 Fright With Fake Tracking Map
The coronavirus, now known as COVID-19, has reached an alarming rate globally, causing the mass to act recklessly as time could not be more hectic for the nation. Many have gone berserk with panic...
A Brief Introduction to VPN
We have often heard of this acronym but never seem to know what it means. VPN stands for Virtual Private Network. Some may see it as another IT jargon, so we are here to change that for you. ...
Malaysians Credit Card Details Exposed in the Deep, Dark Web
Do you own a credit card? You might want to listen closely and be extra cautious from now onwards. Technisanct, an India-based cybersecurity start-up, informed of a data breach involving 310,669...
Data in Jeopardy for Tesco Clubcard Members
United Kingdom, 2 March 2020 - Tesco, a giant supermarket chain was recently abrupted with risk to a data breach, jeopardizing 600,000 Clubcard accounts containing card holder’s personal data....
2020 Is The Year For Cybersecurity
The Internet is booming with infinite numbers of users year by year, 2020 will foresee great challenges towards the cybersecurity industry. Cybersecurity awareness has become more prominent, as the...
FBI Offers $5 Millions For Russian Hackers
The identities of 2 Russian hackers have been disclosed by The United States Department of Justice with the help of its foreign counterpart National Crime Agency (NCA) in the United Kingdom. The...
3 Main Types of Hackers
1. BLACK HATS: THE BAD GUYS Black hat hackers (which also known as crackers) are the people that breach vulnerable companies. They are the bad guys whom exploit other’s weaknesses to steal valuable...
Top 4 Causes of Data Loss
1.Ransomware Ransomware is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. Two common methods today are...