Resource

READ

INSIGHTS

FROM OUR EXPERTS

Feel free to download the articles.

Please subscribe to our mailing list for the latest Free articles updates.

Submit

Featured Article

Everything SMART

Everything SMART

Leave review
You wake up in the morning as the alarm from your smart speaker goes off, gently tugging you out of your slumber. The alarm knows when to wake you up, and not by faithfully adhering to your set alarm ...
Read More

All Articles

Understanding Drone For Forensic Analysis

Understanding Drone For Forensic Analysis

Leave review
Unmanned Aerial Vehicle (UAV), better known as a drone, can be defined as an airplane that is controlled by a remote or computer programme. It is an airplane that functions without a human pilot on bo...
Read More
Cryptocurrencies & Regulations

Cryptocurrencies & Regulations

Leave review
There is no denying that cryptocurrencies have taken the world by storm. The market cap of cryptocurrencies shows astonishing numbers (CoinMarketCap.com, 27th June 2019). Bitcoin, the largest cryptocu...
Read More
Cyber Threat Intelligence: In Need Or In Trend

Cyber Threat Intelligence: In Need Or In Trend

Leave review
Intelligence is defined as first-hand information that leads to changes in behaviour. In cybersecurity, threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, impl...
Read More
Are You The Weakest Link?

Are You The Weakest Link?

Leave review
In an era dominated by growing virtual crime, cybersecurity and cybersecurity awareness are critical to our survival. Although organizations are constantly broadening their use of advanced security te...
Read More
Top 5 Methods Of Cyberbullying: An Introduction To Cyberbullying, Its Affect On Youth And Preventive Measures

Top 5 Methods Of Cyberbullying: An Introduction To Cyberbullying, Its Affect On Youth And Preventive Measures

Leave review
When 14-year-old Carney Bonner from the UK read this Facebook message he was so distressed that he began to self-harm. The cyberbullying continued for a year. Carney Bonner got help and now is a cyber...
Read More
Social Engineering: The Human Hacking

Social Engineering: The Human Hacking

Leave review
There are currently a few definitions of social engineering depending on which book you read or to whom you speak. Based on Wikipedia, it is “The psychological manipulation of people into performing a...
Read More
TikTok & Security Risks

TikTok & Security Risks

Leave review
Quite a number of social media apps are recently coming in-trend, especially among the younger generations. One of the most popular apps is TikTok. This article explains what TikTok is and the risks f...
Read More
Secure Your Mobile Wallet’s Fuel Retail App

Secure Your Mobile Wallet’s Fuel Retail App

Leave review
The mobile wallet is continuously growing in popularity as seen by the increased deployment, mobile penetration and financial inclusion. It is undeniably more convenient, faster and more economical [1...
Read More
Cybersecurity Malaysia Internet Of Things (IoT) Security Framework

Cybersecurity Malaysia Internet Of Things (IoT) Security Framework

Leave review
The Internet of Things (IoT) is a powerful industrial system through which end devices are interconnected and automated, allowing the devices to analyse data and execute actions based on the analysis....
Read More
Ransomware

Ransomware

Leave review
Ransomware is a category of malicious software (malware) that encrypts a victim’s files or locks the system. Then ransom is demanded from the owner of the infected system to regain access [1]. Ransomw...
Read More
Proactive Approaches To Insider Threat

Proactive Approaches To Insider Threat

Leave review
An insider threat can be defined as an evil-intentioned threat that can be posed by people within an organization, like employees, former employees, vendors or business associates. These people are of...
Read More
Everything SMART

Everything SMART

Leave review
You wake up in the morning as the alarm from your smart speaker goes off, gently tugging you out of your slumber. The alarm knows when to wake you up, and not by faithfully adhering to your set alarm ...
Read More
Denial-of-Service (DoS) Attacks And Mitigation Process

Denial-of-Service (DoS) Attacks And Mitigation Process

Leave review
Denial-of-Service (DoS) is a class of attacks whereby attackers attempt to bring down online services. DoS attacks flood systems, servers or networks with traffic to exhaust resources and bandwidth. A...
Read More
Factors To Consider For Certifying Cybersecurity Professionals – A Proposed Solution

Factors To Consider For Certifying Cybersecurity Professionals – A Proposed Solution

Leave review
IT managers, CEOs and government officials generally agree that the cybersecurity profession is less regulated than the engineering profession, for example. There is a very low barrier of entry into ...
Read More
Why Are Cyber Drills Necessary?

Why Are Cyber Drills Necessary?

Leave review
Cybersecurity incidents can inevitably occur in any organization. It is thus necessary to carry out early preparation of computer security incident handling response as an alternative after establishi...
Read More
Information Security Preservation In The Event Of Relocation

Information Security Preservation In The Event Of Relocation

Leave review
In the event of office migration, movement or relocation to a new building, an organisation should ensure that the information assets which support the organisation’s business processes and services a...
Read More
Macau Scam

Macau Scam

Leave review
A scam can be described as a fraudulent scheme carried out by a dishonest person, group, or business in an effort to obtain cash or other valuables. Scams traditionally work by tricks on trust, whereb...
Read More
Tracing Cryptocurrency

Tracing Cryptocurrency

Leave review
Cryptocurrency and Bitcoin in particular is not considered 100% private. At some point, users may use Bitcoin to purchase products or services that require the buyer’s identification due to regulation...
Read More
Real Case Scenario – How Law Enforcement Agencies Beat Deep Web Crime

Real Case Scenario – How Law Enforcement Agencies Beat Deep Web Crime

Leave review
Efforts of combating Dark Web crime have previously involved firefighting methods. Authorities would hunt down administrators of Dark Web sites selling contraband and shut down the sites. But in a mat...
Read More
We use cookies

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. By browsing our website, you consent to our use of cookies and other tracking technologies.