Blogs
Overview of Social Engineering

Overview of Social Engineering

The term "social engineering" is used to describe a wide variety of fraudulent actions carried out by manipulating human interactions. It employs deception based on psychological techniques to trick users into failing to take proper security precautions or into...

5 Ways to Spot a Phishing Email

5 Ways to Spot a Phishing Email

Hackers use this tactic, known as "email phishing," which is a type of cyberattack where a hacker uses emails by posing as a trusted business to trick recipients into giving out personal information, and bank details, and clicking on malicious links. Furthermore,...

Data Scrapping Used to Obtain Millions of WhatsApp Numbers

Data Scrapping Used to Obtain Millions of WhatsApp Numbers

Introduction Did you know that more than 2 billion people in over 180 countries use WhatsApp?WhatsApp Messenger has seen an increase in the use of its application by users around the globe to stay connected with friends and their loved ones at any time. As more people...

Condition Zebra Announce New Partnership with KnowBe4

Aiming to provide public and private SMEs businesses in Malaysia with world-class security products and services10 November 2022 Petaling Jaya, Malaysia - Condition Zebra, today announced a new reseller partnership agreement with KnowBe4, the provider of the world’s...

Hacktivism: A Threat to Cybersecurity

Hacktivism: A Threat to Cybersecurity

Given the massive evolution that both the Internet and the world of computers have undergone over the past decade, it’s no surprise to see the influence they have on the various social issues in our world. As seen when Dragon Force Malaysia unleashed a wave of cyber...

Cybersecurity skills shortage in today’s workforce

Cybersecurity skills shortage in today’s workforce

Introduction Knowledge is power, and ignorance is bliss. There are two statements that, although contradicting each other, hold true in modern society. In many cases, the more you know, the better equipped you are to perform specific tasks and requirements. Similarly,...