Hackers compromising on companies’ digital payment system
With the pandemic situations and emerging use of digital payment technologies, many companies have transformed the way they do business with e-financing. Recently, TEKUN Nasional experienced cyberattacks on its SPIM system. On the 19th of February this year, The Edge...
Beware of new methods of phone chat application hacking
The usage of mobile phones has become indispensable in today's world. The majority of the world's hackers now have their sights set on mobile phone users.On the 24th of March, 2022, it was reported that there is a growing number of perpetrators adopted a certain modus...
Ransomware Attacks in 2022: Malaysia’s Ultimate Guide
Table of Contents1. Ransomware Overview2. Ransomware cases in Malaysia20212020201920182017201620153. Ransomware Recovery4. Ransomware Prevention5. Ransomware Dilemma: To pay or not6. ConclusionReport to us Ultimate Guide to Ransomware Attacks This is the ultimate...
Condition Zebra achieves ISO 27001:2013 certificate
We are delighted to announce that we have achieved ISO 27001:2013 certificate.This recognition ensures that our services adhere to international standards that meet the best practice for an information security management system. Through this certification, Condition...
Cybersecurity: 5 Great Ideas for Small Businesses
As companies, people, and equipment become more connected, vulnerabilities and threats that computer systems face rise. From phishing to more advanced attacks on connected devices, threats are becoming more sophisticated and increasing in numbers. FBI's Internet Crime...
Physical security in the realm of cybersecurity
This article discusses the importance of physical security in the realm of cybersecurity. Understanding Physical Security ThreatsMany organizations think after migrating their infrastructures which are commonly referred to as "the cloud", will reduce the reliance on a...